Sciweavers

41938 search results - page 8256 / 8388
» Complex Systems Modeling
Sort
View
USS
2010
13 years 8 months ago
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users
In this paper we introduce a framework for privacypreserving distributed computation that is practical for many real-world applications. The framework is called Peers for Privacy ...
Yitao Duan, NetEase Youdao, John Canny, Justin Z. ...
WISE
2010
Springer
13 years 8 months ago
Neighborhood-Restricted Mining and Weighted Application of Association Rules for Recommenders
Abstract. Association rule mining algorithms such as Apriori were originally developed to automatically detect patterns in sales transactions and were later on also successfully ap...
Fatih Gedikli, Dietmar Jannach
EDM
2009
184views Data Mining» more  EDM 2009»
13 years 8 months ago
Process Mining Online Assessment Data
Traditional data mining techniques have been extensively applied to find interesting patterns, build descriptive and predictive models from large volumes of data accumulated throug...
Mykola Pechenizkiy, Nikola Trcka, Ekaterina Vasily...
BC
2010
163views more  BC 2010»
13 years 7 months ago
Action and behavior: a free-energy formulation
We have previously tried to explain perceptual inference and learning under a free-energy principle that pursues Helmholtz's agenda to understand the brain in terms of energy ...
Karl J. Friston, Jean Daunizeau, James Kilner, Ste...
CVPR
2011
IEEE
13 years 6 months ago
Face Image Retrieval by Shape Manipulation
Current face image retrieval methods achieve impressive results, but lack efficient ways to refine the search, particularly for geometric face attributes. Users cannot easily ...
Brandon Smith, Shengqi Zhu, Li Zhang
« Prev « First page 8256 / 8388 Last » Next »