We propose and evaluate a family of methods for converting classifier learning algorithms and classification theory into cost-sensitive algorithms and theory. The proposed conve...
We present Storm, a storage system which unifies the desktop and the public network, making Web links between desktop documents more practical. Storm assigns each document a perm...
Benja Fallenstein, Tuomas J. Lukka, Hermanni Hyyti...
This article presents a study of online digital library (DL) uses, based on three data sources (online questionnaire, Internet traffic data and interviews). We show that DL users d...
Houssem Assadi, Thomas Beauvisage, Catherine Lupov...
We have proposed replicator neural networks (RNNs) as an outlier detecting algorithm [15]. Here we compare RNN for outlier detection with three other methods using both publicly a...
Graham J. Williams, Rohan A. Baxter, Hongxing He, ...
d Abstract) Philip MacKenzie and Michael K. Reiter Bell Labs, Lucent Technologies, Murray Hill, NJ, USA We describe a means of sharing the DSA signature function, so that two parti...