Sciweavers

1551 search results - page 254 / 311
» How Typical is the
Sort
View
WWW
2009
ACM
14 years 5 months ago
Network-aware forward caching
This paper proposes and evaluates a Network Aware Forward Caching approach for determining the optimal deployment strategy of forward caches to a network. A key advantage of this ...
Jeffrey Erman, Alexandre Gerber, Mohammad Taghi Ha...
CIDM
2009
IEEE
14 years 5 months ago
Ensemble member selection using multi-objective optimization
— Both theory and a wealth of empirical studies have established that ensembles are more accurate than single predictive models. Unfortunately, the problem of how to maximize ens...
Tuve Löfström, Ulf Johansson, Henrik Bos...
CSE
2009
IEEE
14 years 5 months ago
Analysing BitTorrent's Seeding Strategies
Abstract— BitTorrent is a typical peer-to-peer (P2P) file distribution application that has gained tremendous popularity in recent years. A considerable amount of research exists...
Xinuo Chen, Stephen A. Jarvis
ICDM
2009
IEEE
233views Data Mining» more  ICDM 2009»
14 years 5 months ago
Semi-Supervised Sequence Labeling with Self-Learned Features
—Typical information extraction (IE) systems can be seen as tasks assigning labels to words in a natural language sequence. The performance is restricted by the availability of l...
Yanjun Qi, Pavel Kuksa, Ronan Collobert, Kunihiko ...
ICDM
2009
IEEE
126views Data Mining» more  ICDM 2009»
14 years 5 months ago
Convex Non-negative Matrix Factorization in the Wild
Abstract—Non-negative matrix factorization (NMF) has recently received a lot of attention in data mining, information retrieval, and computer vision. It factorizes a non-negative...
Christian Thurau, Kristian Kersting, Christian Bau...