Sciweavers

17920 search results - page 3564 / 3584
» Recentering computer science
Sort
View
JCST
2010
119views more  JCST 2010»
13 years 9 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
JIDM
2010
160views more  JIDM 2010»
13 years 9 months ago
Evaluation of Conditional Preference Queries
The need for incorporating preference querying in database technology is a very important issue in a variety of applications ranging from e-commerce to personalized search engines....
Fabiola S. F. Pereira, Sandra de Amo
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 9 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 9 months ago
Scalable similarity search with optimized kernel hashing
Scalable similarity search is the core of many large scale learning or data mining applications. Recently, many research results demonstrate that one promising approach is creatin...
Junfeng He, Wei Liu, Shih-Fu Chang
LATIN
2010
Springer
13 years 9 months ago
On Quadratic Threshold CSPs
A predicate P : {−1, 1}k → {0, 1} can be associated with a constraint satisfaction problem Max CSP(P). P is called “approximation resistant†if Max CSP(P) cannot be approxi...
Per Austrin, Siavosh Benabbas, Avner Magen
« Prev « First page 3564 / 3584 Last » Next »