Sciweavers

923 search results - page 176 / 185
» Requirements for Machine Lifelong Learning
Sort
View
137
Voted
KDD
2009
ACM
133views Data Mining» more  KDD 2009»
16 years 4 months ago
On the tradeoff between privacy and utility in data publishing
In data publishing, anonymization techniques such as generalization and bucketization have been designed to provide privacy protection. In the meanwhile, they reduce the utility o...
Tiancheng Li, Ninghui Li
140
Voted
MOBISYS
2009
ACM
16 years 4 months ago
Sensor selection for energy-efficient ambulatory medical monitoring
Epilepsy affects over three million Americans of all ages. Despite recent advances, more than 20% of individuals with epilepsy never achieve adequate control of their seizures. Th...
Eugene Shih, Ali H. Shoeb, John V. Guttag
119
Voted
KDD
2002
ACM
106views Data Mining» more  KDD 2002»
16 years 4 months ago
Selecting the right interestingness measure for association patterns
Many techniques for association rule mining and feature selection require a suitable metric to capture the dependencies among variables in a data set. For example, metrics such as...
Pang-Ning Tan, Vipin Kumar, Jaideep Srivastava
125
Voted
HPCA
2008
IEEE
16 years 4 months ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...
148
Voted
SOSP
2007
ACM
16 years 18 days ago
/*icomment: bugs or bad comments?*/
Commenting source code has long been a common practice in software development. Compared to source code, comments are more direct, descriptive and easy-to-understand. Comments and...
Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou