Sciweavers

2465 search results - page 284 / 493
» Distributed knowledge
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 10 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
IPPS
2006
IEEE
14 years 3 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
ECCV
2002
Springer
14 years 11 months ago
Nonlinear Shape Statistics in Mumford-Shah Based Segmentation
We present a variational integration of nonlinear shape statistics into a Mumford?Shah based segmentation process. The nonlinear statistics are derived from a set of training silho...
Christoph Schnörr, Daniel Cremers, Timo Kohlb...
ICDE
2006
IEEE
136views Database» more  ICDE 2006»
14 years 11 months ago
XCluster Synopses for Structured XML Content
We tackle the difficult problem of summarizing the path/branching structure and value content of an XML database that comprises both numeric and textual values. We introduce a nov...
Neoklis Polyzotis, Minos N. Garofalakis
ICML
2009
IEEE
14 years 10 months ago
Deep transfer via second-order Markov logic
Standard inductive learning requires that training and test instances come from the same distribution. Transfer learning seeks to remove this restriction. In shallow transfer, tes...
Jesse Davis, Pedro Domingos