Sciweavers

2049 search results - page 395 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
WWW
2011
ACM
13 years 4 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
SJ
2010
136views more  SJ 2010»
13 years 4 months ago
Optimizing the Migration to Future-Generation Passive Optical Networks (PON)
We study the upgrading problem of existing Passive Optical Networks (PONs) that need to increase their capacity at different points in time. Our method upgrades line rates and migr...
M. De Andrade, Massimo Tornatore, S. Sallent, Bisw...
ACL
2012
12 years 1 days ago
Learning to "Read Between the Lines" using Bayesian Logic Programs
Most information extraction (IE) systems identify facts that are explicitly stated in text. However, in natural language, some facts are implicit, and identifying them requires â€...
Sindhu Raghavan, Raymond J. Mooney, Hyeonseo Ku
CASES
2009
ACM
14 years 4 months ago
A platform for developing adaptable multicore applications
Computer systems are resource constrained. Application adaptation is a useful way to optimize system resource usage while satisfying the application performance constraints. Previ...
Dan Fay, Li Shang, Dirk Grunwald
AI50
2006
14 years 1 months ago
Fifty Years of AI: From Symbols to Embodiment - and Back
There are many stories to tell about the first fifty years of AI. One story is about AI as one of the big forces of innovation in information technology. It is now forgotten that i...
Luc Steels