Sciweavers

841 search results - page 41 / 169
» Generalized Projection Based M-Estimator: Theory and Applica...
Sort
View
KDD
2009
ACM
182views Data Mining» more  KDD 2009»
14 years 8 months ago
Scalable graph clustering using stochastic flows: applications to community discovery
Algorithms based on simulating stochastic flows are a simple and natural solution for the problem of clustering graphs, but their widespread use has been hampered by their lack of...
Venu Satuluri, Srinivasan Parthasarathy
SIGMETRICS
2006
ACM
121views Hardware» more  SIGMETRICS 2006»
14 years 2 months ago
Transient analysis of tree-Like processes and its application to random access systems
A new methodology to assess transient performance measures of tree-like processes is proposed by introducing the concept of tree-like processes with marked time epochs. As opposed...
Jeroen Van Velthoven, Benny Van Houdt, Chris Blond...
SIGIR
2010
ACM
13 years 8 months ago
SED: supervised experimental design and its application to text classification
In recent years, active learning methods based on experimental design achieve state-of-the-art performance in text classification applications. Although these methods can exploit ...
Yi Zhen, Dit-Yan Yeung
AUTOMATICA
2008
139views more  AUTOMATICA 2008»
13 years 8 months ago
Structured low-rank approximation and its applications
Fitting data by a bounded complexity linear model is equivalent to low-rank approximation of a matrix constructed from the data. The data matrix being Hankel structured is equival...
Ivan Markovsky
IDTRUST
2009
ACM
14 years 2 months ago
A calculus of trust and its application to PKI and identity management
We introduce a formal semantics based calculus of trust that explicitly represents trust and quantifies the risk associated with trust in public key infrastructure (PKI) and iden...
Jingwei Huang, David Nicol