Sciweavers

2706 search results - page 438 / 542
» The case for a new business model
Sort
View
SDM
2008
SIAM
206views Data Mining» more  SDM 2008»
13 years 10 months ago
Latent Variable Mining with Its Applications to Anomalous Behavior Detection
In this paper, we propose a new approach to anomaly detection by looking at the latent variable space to make the first step toward latent anomaly detection. Most conventional app...
Shunsuke Hirose, Kenji Yamanishi
IJCAI
2003
13 years 10 months ago
Automatic Video Interpretation: A Novel Algorithm for Temporal Scenario Recognition
This paper presents a new scenario recognition algorithm for Video Interpretation. We represent a scenario model by specifying the characters involved in the scenario, the sub-sce...
Van-Thinh Vu, François Brémond, Moni...
SODA
1998
ACM
99views Algorithms» more  SODA 1998»
13 years 10 months ago
Online Throughput-Competitive Algorithm for Multicast Routing and Admission Control
We present the first polylog-competitive online algorithm for the general multicast admission control and routing problem in the throughput model. The ratio of the number of reque...
Ashish Goel, Monika Rauch Henzinger, Serge A. Plot...
ALT
2010
Springer
13 years 9 months ago
Recursive Teaching Dimension, Learning Complexity, and Maximum Classes
This paper is concerned with the combinatorial structure of concept classes that can be learned from a small number of examples. We show that the recently introduced notion of recu...
Thorsten Doliwa, Hans-Ulrich Simon, Sandra Zilles
CORR
2010
Springer
131views Education» more  CORR 2010»
13 years 9 months ago
Multimode Control Attacks on Elections
In 1992, Bartholdi, Tovey, and Trick [1992] opened the study of control attacks on elections--attempts to improve the election outcome by such actions as adding/deleting candidate...
Piotr Faliszewski, Edith Hemaspaandra, Lane A. Hem...