Sciweavers

2715 search results - page 203 / 543
» Database Publication Practices
Sort
View
ICDM
2003
IEEE
134views Data Mining» more  ICDM 2003»
14 years 1 months ago
Cost-Sensitive Learning by Cost-Proportionate Example Weighting
We propose and evaluate a family of methods for converting classifier learning algorithms and classification theory into cost-sensitive algorithms and theory. The proposed conve...
Bianca Zadrozny, John Langford, Naoki Abe
HT
2003
ACM
14 years 1 months ago
Storm: using P2P to make the desktop part of the web
We present Storm, a storage system which unifies the desktop and the public network, making Web links between desktop documents more practical. Storm assigns each document a perm...
Benja Fallenstein, Tuomas J. Lukka, Hermanni Hyyti...
ERCIMDL
2003
Springer
90views Education» more  ERCIMDL 2003»
14 years 1 months ago
Users and Uses of Online Digital Libraries in France
This article presents a study of online digital library (DL) uses, based on three data sources (online questionnaire, Internet traffic data and interviews). We show that DL users d...
Houssem Assadi, Thomas Beauvisage, Catherine Lupov...
ICDM
2002
IEEE
188views Data Mining» more  ICDM 2002»
14 years 1 months ago
A Comparative Study of RNN for Outlier Detection in Data Mining
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
CRYPTO
2001
Springer
97views Cryptology» more  CRYPTO 2001»
14 years 24 days ago
Two-Party Generation of DSA Signatures
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...
Philip D. MacKenzie, Michael K. Reiter