Sciweavers

2025 search results - page 265 / 405
» On the Utility of Inference Mechanisms
Sort
View
ICML
2001
IEEE
14 years 9 months ago
Learning Probabilistic Models of Relational Structure
Most real-world data is stored in relational form. In contrast, most statistical learning methods work with "flat" data representations, forcing us to convert our data i...
Lise Getoor, Nir Friedman, Daphne Koller, Benjamin...
WWW
2009
ACM
14 years 8 months ago
MASTH proxy: an extensible platform for web overload control
Many overload control mechanisms for Web based applications aim to prevent overload by setting limits on factors such as admitted load, number of server threads, buffer size. For ...
Vipul Mathur, Sanket Dhopeshwarkar, Varsha Apte
WWW
2008
ACM
14 years 8 months ago
Information retrieval and knowledge discovery on the semantic web of traditional chinese medicine
We conduct the first systematical adoption of the Semantic Web solution in the integration, management, and utilization of TCM information and knowledge resources. As the results,...
Zhaohui Wu, Tong Yu, Huajun Chen, Xiaohong Jiang, ...
KDD
2006
ACM
170views Data Mining» more  KDD 2006»
14 years 8 months ago
Classification features for attack detection in collaborative recommender systems
Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in r...
Robin D. Burke, Bamshad Mobasher, Chad Williams, R...
HPCA
2008
IEEE
14 years 8 months ago
Single-level integrity and confidentiality protection for distributed shared memory multiprocessors
Multiprocessor computer systems are currently widely used in commercial settings to run critical applications. These applications often operate on sensitive data such as customer ...
Brian Rogers, Chenyu Yan, Siddhartha Chhabra, Milo...