Sciweavers

638 search results - page 114 / 128
» Competitive contagion in networks
Sort
View
ICDM
2010
IEEE
216views Data Mining» more  ICDM 2010»
13 years 5 months ago
Data Editing Techniques to Allow the Application of Distance-Based Outlier Detection to Streams
The problem of finding outliers in data has broad applications in areas as diverse as data cleaning, fraud detection, network monitoring, invasive species monitoring, etc. While th...
Vit Niennattrakul, Eamonn J. Keogh, Chotirat Ann R...
ANOR
2010
153views more  ANOR 2010»
13 years 5 months ago
Solving the Rectangular assignment problem and applications
The rectangular assignment problem is a generalization of the linear assignment problem (LAP): one wants to assign a number of persons to a smaller number of jobs, minimizing the ...
J. Bijsterbosch, A. Volgenant
PAMI
2011
13 years 2 months ago
Revisiting Linear Discriminant Techniques in Gender Recognition
—Emerging applications of computer vision and pattern recognition in mobile devices and networked computing require the development of resourcelimited algorithms. Linear classifi...
Juan Bekios-Calfa, José Miguel Buenaposada,...
JMLR
2010
230views more  JMLR 2010»
13 years 2 months ago
Learning Dissimilarities for Categorical Symbols
In this paper we learn a dissimilarity measure for categorical data, for effective classification of the data points. Each categorical feature (with values taken from a finite set...
Jierui Xie, Boleslaw K. Szymanski, Mohammed J. Zak...
SIGACT
2010
68views more  SIGACT 2010»
13 years 2 months ago
A survey of buffer management policies for packet switches
Over the past decade, there has been great interest in the study of buffer management policies in the context of packet transmission for network switches. In a typical model, a sw...
Michael H. Goldwasser