Sciweavers

1776 search results - page 284 / 356
» Informational cascades in IT adoption
Sort
View
WEBI
2005
Springer
14 years 3 months ago
Page-reRank: Using Trusted Links to Re-Rank Authority
The basis of much of the intelligence on the Web is the hyperlink structure which represents an organising principle based on the human facility to be able to discriminate between...
Paolo Massa, Conor Hayes
CORR
2012
Springer
232views Education» more  CORR 2012»
12 years 5 months ago
Smoothing Proximal Gradient Method for General Structured Sparse Learning
We study the problem of learning high dimensional regression models regularized by a structured-sparsity-inducing penalty that encodes prior structural information on either input...
Xi Chen, Qihang Lin, Seyoung Kim, Jaime G. Carbone...
TON
2012
12 years 13 days ago
Opportunistic Spectrum Access in Multiple-Primary-User Environments Under the Packet Collision Constraint
—Cognitive Radio (CR) technology has great potential to alleviate spectrum scarcity in wireless communications. It allows secondary users (SUs) to opportunistically access spectr...
Eric Jung, Xin Liu
CVPR
2012
IEEE
12 years 13 days ago
Actionable saliency detection: Independent motion detection without independent motion estimation
We present a model and an algorithm to detect salient regions in video taken from a moving camera. In particular, we are interested in capturing small objects that move independen...
Georgios Georgiadis, Alper Ayvaci, Stefano Soatto
TKDE
2012
229views Formal Methods» more  TKDE 2012»
12 years 12 days ago
Effective Pattern Discovery for Text Mining
—Many data mining techniques have been proposed for mining useful patterns in text documents. However, how to effectively use and update discovered patterns is still an open rese...
Ning Zhong, Yuefeng Li, Sheng-Tang Wu