Sciweavers

2490 search results - page 87 / 498
» The Generalized Theory of Model Preference
Sort
View
COMPLEX
2009
Springer
15 years 8 months ago
A Comparative Analysis of Specific Spatial Network Topological Models
Creating ensembles of random but "realistic" topologies for complex systems is crucial for many tasks such as benchmark generation and algorithm analysis. In general, exp...
Jun Wang, Gregory M. Provan
ICCS
2007
Springer
15 years 10 months ago
Pushing Frequency Constraint to Utility Mining Model
Traditional association rules mining (ARM) only concerns the frequency of itemsets, which may not bring large amount of profit. Utility mining only focuses on itemsets with high ut...
Jing Wang, Ying Liu, Lin Zhou, Yong Shi, Xingquan ...
ICGI
1994
Springer
15 years 8 months ago
Inducing Probabilistic Grammars by Bayesian Model Merging
We describe a framework for inducing probabilistic grammars from corpora of positive samples. First, samples are incorporated by adding ad-hoc rules to a working grammar; subseque...
Andreas Stolcke, Stephen M. Omohundro
EDBT
2009
ACM
136views Database» more  EDBT 2009»
15 years 11 months ago
On the comparison of microdata disclosure control algorithms
Privacy models such as k-anonymity and -diversity typically offer an aggregate or scalar notion of the privacy property that holds collectively on the entire anonymized data set....
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
125
Voted
CN
2006
111views more  CN 2006»
15 years 4 months ago
Analytical modeling of CAC in next generation wireless systems
Though Connection Admission Control (CAC) in wireless networks has been studied extensively, the heterogeneous structure of Next Generation Wireless Systems (NGWS) makes CAC very ...
Tuna Tugcu, H. Birkan Yilmaz, Feodor S. Vainstein