Sciweavers

7853 search results - page 1443 / 1571
» Learning from Each Other
Sort
View
SDM
2007
SIAM
89views Data Mining» more  SDM 2007»
15 years 4 months ago
Preventing Information Leaks in Email
The widespread use of email has raised serious privacy concerns. A critical issue is how to prevent email information leaks, i.e., when a message is accidentally addressed to non-...
Vitor R. Carvalho, William W. Cohen
132
Voted
NIPS
2004
15 years 4 months ago
Confidence Intervals for the Area Under the ROC Curve
In many applications, good ranking is a highly desirable performance for a classifier. The criterion commonly used to measure the ranking quality of a classification algorithm is ...
Corinna Cortes, Mehryar Mohri
137
Voted
NIPS
2003
15 years 4 months ago
A Classification-based Cocktail-party Processor
At a cocktail party, a listener can selectively attend to a single voice and filter out other acoustical interferences. How to simulate this perceptual ability remains a great cha...
Nicoleta Roman, DeLiang L. Wang, Guy J. Brown
142
Voted
SDM
2003
SIAM
123views Data Mining» more  SDM 2003»
15 years 4 months ago
Fast Online SVD Revisions for Lightweight Recommender Systems
The singular value decomposition (SVD) is fundamental to many data modeling/mining algorithms, but SVD algorithms typically have quadratic complexity and require random access to ...
Matthew Brand
139
Voted
IJCAI
1997
15 years 4 months ago
Object Identification in a Bayesian Context
Object identification—the task of deciding that two observed objects are in fact one and the same object—is a fundamental requirement for any situated agent that reasons about...
Timothy Huang, Stuart J. Russell
« Prev « First page 1443 / 1571 Last » Next »