Sciweavers

867 search results - page 153 / 174
» Secure Input for Web Applications
Sort
View
PVLDB
2010
120views more  PVLDB 2010»
13 years 6 months ago
Sampling the Repairs of Functional Dependency Violations under Hard Constraints
Violations of functional dependencies (FDs) are common in practice, often arising in the context of data integration or Web data extraction. Resolving these violations is known to...
George Beskales, Ihab F. Ilyas, Lukasz Golab
ICML
2004
IEEE
14 years 8 months ago
Training conditional random fields via gradient tree boosting
Conditional Random Fields (CRFs; Lafferty, McCallum, & Pereira, 2001) provide a flexible and powerful model for learning to assign labels to elements of sequences in such appl...
Thomas G. Dietterich, Adam Ashenfelter, Yaroslav B...
ISAAC
2009
Springer
175views Algorithms» more  ISAAC 2009»
14 years 2 months ago
Worst-Case and Smoothed Analysis of k-Means Clustering with Bregman Divergences
The k-means algorithm is the method of choice for clustering large-scale data sets and it performs exceedingly well in practice. Most of the theoretical work is restricted to the c...
Bodo Manthey, Heiko Röglin
VRST
2005
ACM
14 years 1 months ago
Dynamic creation of interactive mixed reality presentations
In this paper, we describe a method of dynamic creation of interactive presentations for Mixed Reality environments. The presentations are created automatically for collections of...
Krzysztof Walczak, Rafal Wojciechowski
DIS
2001
Springer
14 years 4 days ago
Eliminating Useless Parts in Semi-structured Documents Using Alternation Counts
We propose a preprocessing method for Web mining which, given semi-structured documents with the same structure and style, distinguishes useless parts and non-useless parts in each...
Daisuke Ikeda, Yasuhiro Yamada, Sachio Hirokawa