Sciweavers

2465 search results - page 284 / 493
» Distributed knowledge
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
16 years 2 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
IPPS
2006
IEEE
15 years 8 months ago
A case for exploit-robust and attack-aware protocol RFCs
A large number of vulnerabilities occur because protocol implementations failed to anticipate illegal packets. rfcs typically define what constitute “right” packets relevant ...
Venkat Pothamsetty, Prabhaker Mateti
100
Voted
ECCV
2002
Springer
16 years 4 months ago
Nonlinear Shape Statistics in Mumford-Shah Based Segmentation
We present a variational integration of nonlinear shape statistics into a Mumford?Shah based segmentation process. The nonlinear statistics are derived from a set of training silho...
Christoph Schnörr, Daniel Cremers, Timo Kohlb...
ICDE
2006
IEEE
136views Database» more  ICDE 2006»
16 years 3 months ago
XCluster Synopses for Structured XML Content
We tackle the difficult problem of summarizing the path/branching structure and value content of an XML database that comprises both numeric and textual values. We introduce a nov...
Neoklis Polyzotis, Minos N. Garofalakis
ICML
2009
IEEE
16 years 2 months ago
Deep transfer via second-order Markov logic
Standard inductive learning requires that training and test instances come from the same distribution. Transfer learning seeks to remove this restriction. In shallow transfer, tes...
Jesse Davis, Pedro Domingos