Sciweavers

4127 search results - page 735 / 826
» Evaluation methods for topic models
Sort
View
CHI
2010
ACM
15 years 11 months ago
Generating default privacy policies for online social networks
Default privacy policies have a significant impact on the overall dynamics and success of online social networks, as users tend to keep their initial privacy policies. In this wor...
Eran Toch, Norman M. Sadeh, Jason I. Hong
BIBE
2008
IEEE
137views Bioinformatics» more  BIBE 2008»
15 years 11 months ago
A sparse variational Bayesian approach for fMRI data analysis
— The aim of this work is to propose a new approach for the determination of the design matrix in fMRI experiments. The design matrix embodies all available knowledge about exper...
Vangelis P. Oikonomou, Evanthia E. Tripoliti, Dimi...
CEC
2008
IEEE
15 years 11 months ago
Asynchronous multiple objective particle swarm optimisation in unreliable distributed environments
Abstract— This paper examines the performance characteristics of both asynchronous and synchronous parallel particle swarm optimisation algorithms in heterogeneous, fault-prone e...
Ian Scriven, David Ireland, Andrew Lewis, Sanaz Mo...
FOCS
2008
IEEE
15 years 11 months ago
Computing the Tutte Polynomial in Vertex-Exponential Time
The deletion–contraction algorithm is perhaps the most popular method for computing a host of fundamental graph invariants such as the chromatic, flow, and reliability polynomi...
Andreas Björklund, Thore Husfeldt, Petteri Ka...
HICSS
2008
IEEE
237views Biometrics» more  HICSS 2008»
15 years 11 months ago
Integration of an Ontological Information Security Concept in Risk Aware Business Process Management
Abstract— The ability to prevent risks as well as to appropriately counteract occurring threats has increasingly become a crucial success factor. Traditional business process man...
Gernot Goluch, Andreas Ekelhart, Stefan Fenz, Stef...