Sciweavers

925 search results - page 162 / 185
» The Evaluation of Sentence Similarity Measures
Sort
View
KDD
2008
ACM
163views Data Mining» more  KDD 2008»
14 years 8 months ago
The cost of privacy: destruction of data-mining utility in anonymized data publishing
Re-identification is a major privacy threat to public datasets containing individual records. Many privacy protection algorithms rely on generalization and suppression of "qu...
Justin Brickell, Vitaly Shmatikov
PICS
2000
13 years 9 months ago
CCD Requirements for Digital Photography
Digital photography has the potential to supersede conventional film photography. In order to realize this potential, digital photography needs to provide the best image quality a...
Richard L. Baer
CIKM
2011
Springer
12 years 7 months ago
Simultaneous joint and conditional modeling of documents tagged from two perspectives
This paper explores correspondence and mixture topic modeling of documents tagged from two different perspectives. There has been ongoing work in topic modeling of documents with...
Pradipto Das, Rohini K. Srihari, Yun Fu

Publication
151views
12 years 6 months ago
Embedding Overlap Priors in Variational Left Ventricle Tracking
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. This study investigates overlap priors for variational tracking of the Left Ventricle (LV...
Ismail Ben Ayed, Shuo Li and Ian Ross
ICDE
2010
IEEE
371views Database» more  ICDE 2010»
14 years 7 months ago
TASM: Top-k Approximate Subtree Matching
Abstract-- We consider the Top-k Approximate Subtree Matching (TASM) problem: finding the k best matches of a small query tree, e.g., a DBLP article with 15 nodes, in a large docum...
Nikolaus Augsten, Denilson Barbosa, Michael H. B&o...