Sciweavers

1554 search results - page 301 / 311
» Testing Polymorphic Behavior
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 9 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
DAS
2008
Springer
13 years 9 months ago
Towards Whole-Book Recognition
We describe experimental results for unsupervised recognition of the textual contents of book-images using fully automatic mutual-entropy-based model adaptation. Each experiment s...
Pingping Xiu, Henry S. Baird
NETWORKING
2007
13 years 9 months ago
Multiple Identities in BitTorrent Networks
Abstract. Peer-to-peer (P2P) file sharing systems have become ubiquitous and at present the BitTorrent (BT) based P2P systems are very popular and successful. It has been argued t...
Jin Sun, Anirban Banerjee, Michalis Faloutsos
NIPS
2000
13 years 8 months ago
The Use of MDL to Select among Computational Models of Cognition
How should we decide among competing explanations of a cognitive process given limited observations? The problem of model selection is at the heart of progress in cognitive scienc...
In Jae Myung, Mark A. Pitt, Shaobo Zhang, Vijay Ba...
AAAI
1994
13 years 8 months ago
High Dimension Action Spaces in Robot Skill Learning
Table lookup with interpolation is used for many learning and adaptation tasks. Redundant mappings capture the important concept of \motor skill," which is important in real,...
Jeff G. Schneider