Sciweavers

1579 search results - page 138 / 316
» How Good is the Crowd at
Sort
View
ICDM
2002
IEEE
128views Data Mining» more  ICDM 2002»
14 years 1 months ago
Mining Online Users? Access Records for Web Business Intelligence
This paper discusses about how business intelligence on a website could be obtained from users’ access records instead of web logs of “hits”. Users’ access records are cap...
Simon Fong, Serena Chan
ICSE
2010
IEEE-ACM
14 years 1 months ago
Dynamic symbolic data structure repair
Generic repair of complex data structures is a new and exciting area of research. Existing approaches can integrate with good software engineering practices such as program assert...
Ishtiaque Hussain, Christoph Csallner
CDC
2009
IEEE
179views Control Systems» more  CDC 2009»
14 years 1 months ago
Bayesian network approach to understand regulation of biological processes in cyanobacteria
— Bayesian networks have extensively been used in numerous fields including artificial intelligence, decision theory and control. Its ability to utilize noisy and missing data ...
Thanura R. Elvitigala, Abhay K. Singh, Himadri B. ...
GECCO
2009
Springer
153views Optimization» more  GECCO 2009»
14 years 28 days ago
An evaporation mechanism for dynamic and noisy multimodal optimization
Dealing with imprecise information is a common characteristic in real-world problems. Specifically, when the source of the information are physical sensors, a level of noise in t...
Jose Luis Fernandez-Marquez, Josep Lluís Ar...
CRYPTO
1999
Springer
109views Cryptology» more  CRYPTO 1999»
14 years 18 days ago
Coding Constructions for Blacklisting Problems without Computational Assumptions
Abstract. We consider the broadcast exclusion problem: how to transmit a message over a broadcast channel shared by N = 2n users so that all but some specified coalition of k excl...
Ravi Kumar, Sridhar Rajagopalan, Amit Sahai