Sciweavers

1806 search results - page 168 / 362
» Randomness and halting probabilities
Sort
View
KDD
2003
ACM
124views Data Mining» more  KDD 2003»
14 years 10 months ago
Information-theoretic co-clustering
Two-dimensional contingency or co-occurrence tables arise frequently in important applications such as text, web-log and market-basket data analysis. A basic problem in contingenc...
Inderjit S. Dhillon, Subramanyam Mallela, Dharmend...
ESA
2009
Springer
149views Algorithms» more  ESA 2009»
14 years 4 months ago
3.5-Way Cuckoo Hashing for the Price of 2-and-a-Bit
The study of hashing is closely related to the analysis of balls and bins; items are hashed to memory locations much as balls are thrown into bins. In particular, Azar et. al. [2] ...
Eric Lehman, Rina Panigrahy
ICPR
2008
IEEE
14 years 4 months ago
Generative models for fingerprint individuality using ridge models
Generative models of pattern individuality attempt to learn the distribution of observed quantitative features to determine the probability of two random patterns being the same. ...
Chang Su, Sargur N. Srihari
PODC
2010
ACM
14 years 2 months ago
A modular approach to shared-memory consensus, with applications to the probabilistic-write model
We define two new classes of shared-memory objects: ratifiers, which detect agreement, and conciliators, which ensure agreement with some probability. We show that consensus can...
James Aspnes
SDM
2010
SIAM
128views Data Mining» more  SDM 2010»
13 years 11 months ago
Publishing Skewed Sensitive Microdata
A highly skewed microdata contains some sensitive attribute values that occur far more frequently than others. Such data violates the "eligibility condition" assumed by ...
Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Win...