Sciweavers

2884 search results - page 516 / 577
» Evaluating learning algorithms and classifiers
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 9 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
SIGIR
2005
ACM
14 years 2 months ago
Active feedback in ad hoc information retrieval
Information retrieval is, in general, an iterative search process, in which the user often has several interactions with a retrieval system for an information need. The retrieval ...
Xuehua Shen, ChengXiang Zhai
PAMI
2012
11 years 11 months ago
Recursive Segmentation and Recognition Templates for Image Parsing
— Language and image understanding are two major goals of artificial intelligence which can both be conceptually formulated in terms of parsing the input signal into a hierarchi...
Long Zhu, Yuanhao Chen, Yuan Lin, Chenxi Lin, Alan...
KDD
2008
ACM
178views Data Mining» more  KDD 2008»
14 years 9 months ago
Training structural svms with kernels using sampled cuts
Discriminative training for structured outputs has found increasing applications in areas such as natural language processing, bioinformatics, information retrieval, and computer ...
Chun-Nam John Yu, Thorsten Joachims
CVPR
2009
IEEE
15 years 3 months ago
Global Connectivity Potentials for Random Field Models
Markov random field (MRF, CRF) models are popular in computer vision. However, in order to be computationally tractable they are limited to incorporate only local interactions a...
Sebastian Nowozin, Christoph H. Lampert