Sciweavers

231 search results - page 33 / 47
» Sensitivity of trust-region algorithms to their parameters
Sort
View
CN
2004
67views more  CN 2004»
13 years 6 months ago
Scalable service differentiation using purely end-to-end mechanisms: features and limitations
Abstract-We investigate schemes for achieving service differentiation via weighted end-to-end congestion control mechanisms within the framework of the additive increase/multiplica...
Thyagarajan Nandagopal, Kang-Won Lee, Jia-Ru Li, V...
TKDE
1998
111views more  TKDE 1998»
13 years 6 months ago
Efficient Data Mining for Path Traversal Patterns
—In this paper, we explore a new data mining capability that involves mining path traversal patterns in a distributed information-providing environment where documents or objects...
Ming-Syan Chen, Jong Soo Park, Philip S. Yu
TEC
2002
133views more  TEC 2002»
13 years 6 months ago
Learning and optimization using the clonal selection principle
The clonal selection principle is used to explain the basic features of an adaptive immune response to an antigenic stimulus. It establishes the idea that only those cells that rec...
Leandro Nunes de Castro, Fernando J. Von Zuben
ICML
2005
IEEE
14 years 7 months ago
Exploiting syntactic, semantic and lexical regularities in language modeling via directed Markov random fields
We present a directed Markov random field (MRF) model that combines n-gram models, probabilistic context free grammars (PCFGs) and probabilistic latent semantic analysis (PLSA) fo...
Shaojun Wang, Shaomin Wang, Russell Greiner, Dale ...
KDD
2012
ACM
217views Data Mining» more  KDD 2012»
11 years 9 months ago
Cross-domain collaboration recommendation
Interdisciplinary collaborations have generated huge impact to society. However, it is often hard for researchers to establish such cross-domain collaborations. What are the patte...
Jie Tang, Sen Wu, Jimeng Sun, Hang Su