Sciweavers

1875 search results - page 302 / 375
» Kernel Methods for Pattern Analysis
Sort
View
CHI
2007
ACM
14 years 10 months ago
Appropriation of a MMS-based comic creator: from system functionalities to resources for action
Technologies can be used ? or appropriated ? in different ways by different users, but how do the use patterns evolve, and how can design facilitate such evolution? This paper app...
Antti Salovaara
ICSE
2004
IEEE-ACM
14 years 10 months ago
MSR 2004: International Workshop on Mining Software Repositories
A one-day workshop was held on the topic of mining software repositories at ICSE 2004 in Edinburgh, Scotland. The workshop brought together researchers and practitioners in order ...
Ahmed E. Hassan, Richard C. Holt, Audris Mockus
ALT
2009
Springer
14 years 7 months ago
Approximation Algorithms for Tensor Clustering
Abstract. We present the first (to our knowledge) approximation algorithm for tensor clustering—a powerful generalization to basic 1D clustering. Tensors are increasingly common...
Stefanie Jegelka, Suvrit Sra, Arindam Banerjee
HT
2009
ACM
14 years 4 months ago
Hyperincident connected components of tagging networks
Data created by social bookmarking systems can be described as 3-partite 3-uniform hypergraphs connecting documents, users, and tags (tagging networks), such that the toolbox of c...
Nicolas Neubauer, Klaus Obermayer
ISCAS
2008
IEEE
145views Hardware» more  ISCAS 2008»
14 years 4 months ago
Group learning using contrast NMF : Application to functional and structural MRI of schizophrenia
— Non-negative Matrix factorization (NMF) has increasingly been used as a tool in signal processing in the last couple of years. NMF, like independent component analysis (ICA) is...
Vamsi K. Potluru, Vince D. Calhoun