Sciweavers

41938 search results - page 8256 / 8388
» Complex Systems Modeling
Sort
View
USS
2010
15 years 4 days ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
WISE
2010
Springer
15 years 3 days ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
139
Voted
EDM
2009
184views Data Mining» more  EDM 2009»
15 years 2 days ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
BC
2010
163views more  BC 2010»
14 years 11 months ago
Action and behavior: a free-energy formulation
We have previously tried to explain perceptual inference and learning under a free-energy principle that pursues Helmholtz's agenda to understand the brain in terms of energy ...
Karl J. Friston, Jean Daunizeau, James Kilner, Ste...
121
Voted
CVPR
2011
IEEE
14 years 10 months ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang
« Prev « First page 8256 / 8388 Last » Next »