Sciweavers

209 search results - page 35 / 42
» Learning from defect removals
Sort
View
CIKM
2009
Springer
14 years 2 months ago
Helping editors choose better seed sets for entity set expansion
Sets of named entities are used heavily at commercial search engines such as Google, Yahoo and Bing. Acquiring sets of entities typically consists of combining semi-supervised exp...
Vishnu Vyas, Patrick Pantel, Eric Crestan
DCC
2010
IEEE
14 years 2 months ago
Estimation-Theoretic Delayed Decoding of Predictively Encoded Video Sequences
Current video coding schemes employ motion compensation to exploit the fact that the signal forms an auto-regressive process along the motion trajectory, and remove temporal redun...
Jingning Han, Vinay Melkote, Kenneth Rose
AIRWEB
2009
Springer
14 years 2 months ago
Social spam detection
The popularity of social bookmarking sites has made them prime targets for spammers. Many of these systems require an administrator’s time and energy to manually filter or remo...
Benjamin Markines, Ciro Cattuto, Filippo Menczer
GIS
2007
ACM
14 years 1 months ago
Predicting future locations using clusters' centroids
As technology advances we encounter more available data on moving objects, thus increasing our ability to mine spatiotemporal data. We can use this data for learning moving object...
Sigal Elnekave, Mark Last, Oded Maimon
COCO
2005
Springer
96views Algorithms» more  COCO 2005»
14 years 1 months ago
A Geometric Approach to Information-Theoretic Private Information Retrieval
A t-private private information retrieval (PIR) scheme allows a user to retrieve the ith bit of an n-bit string x replicated among k servers, while any coalition of up to t server...
David P. Woodruff, Sergey Yekhanin