Sciweavers

691 search results - page 90 / 139
» Constructing Ensembles from Data Envelopment Analysis
Sort
View
SIGCOMM
2010
ACM
13 years 9 months ago
Passive IP traceback: capturing the origin of anonymous traffic through network telescopes
IP traceback can be used to find the origin of anonymous traffic; however, Internet-scale IP traceback systems have not been deployed due to a need for cooperation between Interne...
Guang Yao, Jun Bi, Zijian Zhou
CORR
2010
Springer
88views Education» more  CORR 2010»
13 years 9 months ago
Function and form of gestures in a collaborative design meeting
This paper examines the relationship between gestures' function and form in design collaboration. It adopts a cognitive design research viewpoint. The analysis is restricted t...
Willemien Visser
DAS
1998
Springer
14 years 1 months ago
Group 4 Compressed Document Matching
Numerous approaches, including textual, structural and featural, to detecting duplicate documents have been investigated. Considering document images are usually stored and transm...
Dar-Shyang Lee, Jonathan J. Hull
TVCG
2008
112views more  TVCG 2008»
13 years 8 months ago
VisComplete: Automating Suggestions for Visualization Pipelines
Building visualization and analysis pipelines is a large hurdle in the adoption of visualization and workflow systems by domain scientists. In this paper, we propose techniques to ...
David Koop, Carlos Eduardo Scheidegger, Steven P. ...
JMLR
2010
128views more  JMLR 2010»
13 years 7 months ago
On the Rate of Convergence of the Bagged Nearest Neighbor Estimate
Bagging is a simple way to combine estimates in order to improve their performance. This method, suggested by Breiman in 1996, proceeds by resampling from the original data set, c...
Gérard Biau, Frédéric C&eacut...