Sciweavers

2913 search results - page 432 / 583
» How Much to Copy
Sort
View
NETWORKING
2008
13 years 10 months ago
Towards an ISP-Compliant, Peer-Friendly Design for Peer-to-Peer Networks
Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
NIPS
2008
13 years 10 months ago
Beyond Novelty Detection: Incongruent Events, when General and Specific Classifiers Disagree
Unexpected stimuli are a challenge to any machine learning algorithm. Here we identify distinct types of unexpected events, focusing on 'incongruent events' when 'g...
Daphna Weinshall, Hynek Hermansky, Alon Zweig, Jie...
IPCV
2007
13 years 10 months ago
Use of Paraplanar Constraint for Parallel Inspection of Wafer Bump Heights
- The shrunk dimension of electronic devices leads to more stringent requirement on process control and quality assurance of their fabrication. For instance, direct die-to-die bond...
Mei Dong, Ronald Chung, Edmund Y. Lam, Kenneth S. ...
SDM
2008
SIAM
164views Data Mining» more  SDM 2008»
13 years 10 months ago
Randomizing Social Networks: a Spectrum Preserving Approach
Understanding the general properties of real social networks has gained much attention due to the proliferation of networked data. The nodes in the network are the individuals and...
Xiaowei Ying, Xintao Wu
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
13 years 10 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung