Sciweavers

967 search results - page 189 / 194
» Efficient Classification for Metric Data
Sort
View
ATAL
2010
Springer
13 years 8 months ago
Hybrid transitive trust mechanisms
Establishing trust amongst agents is of central importance to the development of well-functioning multi-agent systems. For example, the anonymity of transactions on the Internet c...
Jie Tang, Sven Seuken, David C. Parkes
COMAD
2009
13 years 8 months ago
Graph Clustering for Keyword Search
Keyword search on data represented as graphs, is receiving lot of attention in recent years. Initial versions of keyword search systems assumed that the graph is memory resident. ...
Rose Catherine K., S. Sudarshan
BMCBI
2008
111views more  BMCBI 2008»
13 years 7 months ago
Information-based methods for predicting gene function from systematic gene knock-downs
Background: The rapid annotation of genes on a genome-wide scale is now possible for several organisms using high-throughput RNA interference assays to knock down the expression o...
Matthew T. Weirauch, Christopher K. Wong, Alexandr...
CORR
2008
Springer
112views Education» more  CORR 2008»
13 years 7 months ago
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and mergi...
Tomasz Ciszkowski, Charlott Eliasson, Markus Fiedl...
CVPR
2008
IEEE
14 years 9 months ago
Mining compositional features for boosting
The selection of weak classifiers is critical to the success of boosting techniques. Poor weak classifiers do not perform better than random guess, thus cannot help decrease the t...
Junsong Yuan, Jiebo Luo, Ying Wu