Sciweavers

2677 search results - page 458 / 536
» Personalization of Image Enhancement
Sort
View
GECCO
2008
Springer
152views Optimization» more  GECCO 2008»
13 years 8 months ago
Combatting financial fraud: a coevolutionary anomaly detection approach
A major difficulty for anomaly detection lies in discovering boundaries between normal and anomalous behavior, due to the deficiency of abnormal samples in the training phase. In...
Shelly Xiaonan Wu, Wolfgang Banzhaf
MOBICOM
2010
ACM
13 years 8 months ago
Profiling users in a 3g network using hourglass co-clustering
With widespread popularity of smart phones, more and more users are accessing the Internet on the go. Understanding mobile user browsing behavior is of great significance for seve...
Ram Keralapura, Antonio Nucci, Zhi-Li Zhang, Lixin...
SIGMETRICS
2010
ACM
217views Hardware» more  SIGMETRICS 2010»
13 years 8 months ago
Optimal recovery of single disk failure in RDP code storage systems
Modern storage systems use thousands of inexpensive disks to meet the storage requirement of applications. To enhance the data availability, some form of redundancy is used. For e...
Liping Xiang, Yinlong Xu, John C. S. Lui, Qian Cha...
JAIR
2008
157views more  JAIR 2008»
13 years 7 months ago
Learning to Reach Agreement in a Continuous Ultimatum Game
It is well-known that acting in an individually rational manner, according to the principles of classical game theory, may lead to sub-optimal solutions in a class of problems nam...
Steven de Jong, Simon Uyttendaele, Karl Tuyls
SIGIR
2008
ACM
13 years 7 months ago
Query dependent ranking using K-nearest neighbor
Many ranking models have been proposed in information retrieval, and recently machine learning techniques have also been applied to ranking model construction. Most of the existin...
Xiubo Geng, Tie-Yan Liu, Tao Qin, Andrew Arnold, H...