Sciweavers

1056 search results - page 7 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ECAI
2006
Springer
13 years 11 months ago
Identifying Inter-Domain Similarities Through Content-Based Analysis of Hierarchical Web-Directories
Providing accurate personalized information services to the users requires knowing their interests and needs, as defined by their User Models (UMs). Since the quality of the person...
Shlomo Berkovsky, Dan Goldwasser, Tsvi Kuflik, Fra...
ICASSP
2011
IEEE
12 years 11 months ago
Joint blind source separation from second-order statistics: Necessary and sufficient identifiability conditions
This paper considers the problem of joint blind source separation (J-BSS), which appears in many practical problems such as blind deconvolution or functional magnetic resonance im...
Javier Vía, Matthew Anderson, Xi-Lin Li, T&...
INFOCOM
2010
IEEE
13 years 5 months ago
Efficient Similarity Estimation for Systems Exploiting Data Redundancy
Many modern systems exploit data redundancy to improve efficiency. These systems split data into chunks, generate identifiers for each of them, and compare the identifiers among ot...
Kanat Tangwongsan, Himabindu Pucha, David G. Ander...
BIB
2008
106views more  BIB 2008»
13 years 7 months ago
Biodiversity informatics: the challenge of linking data and the role of shared identifiers
A major challenge facing biodiversity informatics is integrating data stored in widely distributed databases. Initial efforts have relied on taxonomic names as the shared identifi...
Roderic D. M. Page
COMAD
2009
13 years 8 months ago
Vector-based Ranking Techniques for Identifying the Topical Anchors of a Context
Terms in textual documents tend to occur more in contexts to which they are related. We can exploit this bias by modelling terms and their cooccurrences s, resembling the abstract...
Aditya Ramana Rachakonda, Srinath Srinivasa