Sciweavers

2659 search results - page 112 / 532
» Do we mean the same
Sort
View
164
Voted
TIME
2009
IEEE
15 years 11 months ago
Preserving Anonymity of Recurrent Location-Based Queries
—The anonymization of location based queries through the generalization of spatio-temporal information has been proposed as a privacy preserving technique. We show that the prese...
Daniele Riboni, Linda Pareschi, Claudio Bettini, S...
121
Voted
GLOBECOM
2007
IEEE
15 years 11 months ago
Opportunistic Relaying in Cellular Network for Capacity and Fairness Improvement
— In this paper, we study how the cooperative relaying can improve both capacity and fairness in cellular network. The capacity and fairness have a trade-off relationship, so inc...
Seungho Song, Kyuho Son, Hyang-Won Lee, Song Chong
PAKDD
2005
ACM
100views Data Mining» more  PAKDD 2005»
15 years 10 months ago
Pushing Tougher Constraints in Frequent Pattern Mining
In this paper we extend the state-of-art of the constraints that can be pushed in a frequent pattern computation. We introduce a new class of tough constraints, namely Loose Anti-m...
Francesco Bonchi, Claudio Lucchese
134
Voted
NIPS
2008
15 years 6 months ago
Generative versus discriminative training of RBMs for classification of fMRI images
Neuroimaging datasets often have a very large number of voxels and a very small number of training cases, which means that overfitting of models for this data can become a very se...
Tanya Schmah, Geoffrey E. Hinton, Richard S. Zemel...
UAI
2008
15 years 6 months ago
Bounds on the Bethe Free Energy for Gaussian Networks
We address the problem of computing approximate marginals in Gaussian probabilistic models by using mean field and fractional Bethe approximations. As an extension of Welling and ...
Botond Cseke, Tom Heskes