Sciweavers

3474 search results - page 587 / 695
» Data Management in RFID Applications
Sort
View
KDD
2007
ACM
197views Data Mining» more  KDD 2007»
16 years 4 months ago
Learning the kernel matrix in discriminant analysis via quadratically constrained quadratic programming
The kernel function plays a central role in kernel methods. In this paper, we consider the automated learning of the kernel matrix over a convex combination of pre-specified kerne...
Jieping Ye, Shuiwang Ji, Jianhui Chen
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
16 years 4 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
KDD
2006
ACM
191views Data Mining» more  KDD 2006»
16 years 4 months ago
Beyond classification and ranking: constrained optimization of the ROI
Classification has been commonly used in many data mining projects in the financial service industry. For instance, to predict collectability of accounts receivable, a binary clas...
Lian Yan, Patrick Baldasare
DASFAA
2009
IEEE
195views Database» more  DASFAA 2009»
15 years 11 months ago
The XMLBench Project: Comparison of Fast, Multi-platform XML libraries
The XML technologies have brought a lot of new ideas and abilities in the field of information management systems. Nowadays, XML is used almost everywhere: from small configurati...
Suren Chilingaryan
CHI
1998
ACM
15 years 8 months ago
The Progress Portfolio: Designing Reflective Tools for a Classroom Context
A great deal of effort has gone into developing open-ended inquiry activities for science education as well as complex computer tools for accessing scientific data to help student...
Ben Loh, Josh Radinsky, Eric Russell, Louis M. Gom...