Sciweavers

796 search results - page 126 / 160
» Effective Use of the KDD Process and Data Mining for Compute...
Sort
View
SAC
2008
ACM
13 years 8 months ago
Trajectory retrieval with latent semantic analysis
The problem of trajectory similarity has been recently attracted research interest considerably, due to its importance in diverse fields. In this work, we study trajectory similar...
Apostolos N. Papadopoulos
CSE
2009
IEEE
14 years 3 months ago
Security Implications of Virtualization: A Literature Study
— Data centers accumulate corporate and personal data at a rapid pace. Driven by economy of scale and the high bandwidth of today’s network connections, more and more businesse...
André van Cleeff, Wolter Pieters, Roel Wier...
SAC
2006
ACM
14 years 2 months ago
The impact of sample reduction on PCA-based feature extraction for supervised learning
“The curse of dimensionality” is pertinent to many learning algorithms, and it denotes the drastic raise of computational complexity and classification error in high dimension...
Mykola Pechenizkiy, Seppo Puuronen, Alexey Tsymbal
EDBT
2010
ACM
135views Database» more  EDBT 2010»
14 years 3 months ago
Region-based online promotion analysis
This paper addresses a fundamental and challenging problem with broad applications: efficient processing of region-based promotion queries, i.e., to discover the top-k most inter...
Tianyi Wu, Yizhou Sun, Cuiping Li, Jiawei Han
ALT
2010
Springer
13 years 10 months ago
Optimal Online Prediction in Adversarial Environments
: In many prediction problems, including those that arise in computer security and computational finance, the process generating the data is best modeled as an adversary with whom ...
Peter L. Bartlett