Sciweavers

5799 search results - page 1138 / 1160
» Position Paper
Sort
View
SIGKDD
2002
232views more  SIGKDD 2002»
13 years 10 months ago
The True Lift Model - A Novel Data Mining Approach to Response Modeling in Database Marketing
In database marketing, data mining has been used extensively to find the optimal customer targets so as to maximize return on investment. In particular, using marketing campaign d...
Victor S. Y. Lo
TOSEM
1998
80views more  TOSEM 1998»
13 years 10 months ago
Discovering Models of Software Processes from Event-Based Data
Many software process methods and tools presuppose the existence of a formal model of a process. Unfortunately, developing a formal model for an on-going, complex process can be d...
Jonathan E. Cook, Alexander L. Wolf
TROB
2002
138views more  TROB 2002»
13 years 10 months ago
Interference-free polyhedral configurations for stacking
This paper uses a configuration space ( -space) based method to compute interference-free configuration for stacking polyhedral sheet metal parts. This work forms the interference ...
Venkateswara R. Ayyadevara, David A. Bourne, Kenji...
MST
2007
167views more  MST 2007»
13 years 10 months ago
The Complexity of Polynomial-Time Approximation
In 1996, Khanna and Motwani [KM96] proposed three logic-based optimization problems constrained by planar structure, and offered the hypothesis that these putatively fundamental ...
Liming Cai, Michael R. Fellows, David W. Juedes, F...
PAMI
2007
133views more  PAMI 2007»
13 years 10 months ago
Generating Cancelable Fingerprint Templates
—Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several p...
Nalini K. Ratha, Sharat Chikkerur, Jonathan H. Con...
« Prev « First page 1138 / 1160 Last » Next »