Sciweavers

2494 search results - page 464 / 499
» Dependable Distributed Computing Using Free Databases
Sort
View
KDD
2008
ACM
181views Data Mining» more  KDD 2008»
14 years 10 months ago
Learning subspace kernels for classification
Kernel methods have been applied successfully in many data mining tasks. Subspace kernel learning was recently proposed to discover an effective low-dimensional subspace of a kern...
Jianhui Chen, Shuiwang Ji, Betul Ceran, Qi Li, Min...
KDD
2007
ACM
201views Data Mining» more  KDD 2007»
14 years 10 months ago
Structural and temporal analysis of the blogosphere through community factorization
The blogosphere has unique structural and temporal properties since blogs are typically used as communication media among human individuals. In this paper, we propose a novel tech...
Yun Chi, Shenghuo Zhu, Xiaodan Song, Jun'ichi Tate...
MM
2006
ACM
180views Multimedia» more  MM 2006»
14 years 3 months ago
Fast tracking of near-duplicate keyframes in broadcast domain with transitivity propagation
The identification of near-duplicate keyframe (NDK) pairs is a useful task for a variety of applications such as news story threading and content-based video search. In this pape...
Chong-Wah Ngo, Wanlei Zhao, Yu-Gang Jiang
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 11 days ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CHI
2001
ACM
14 years 10 months ago
Responding to subtle, fleeting changes in the user's internal state
In human-to-human interaction, people sometimes are able to pick up and respond sensitively to the other's internal state as it shifts moment by moment over the course of an ...
Wataru Tsukahara, Nigel Ward