Sciweavers

1456 search results - page 149 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
CLEF
2004
Springer
14 years 1 months ago
Report on Thomson Legal and Regulatory Experiments at CLEF-2004
Thomson Legal and Regulatory participated in the CLEF-2004 monolingual and bilingual tracks. Monolingual experiments included Portuguese, Russian and Finnish. We investigated a ne...
Isabelle Moulinier, Ken Williams
WWW
2011
ACM
13 years 3 months ago
Exploiting session-like behaviors in tag prediction
In social bookmarking systems, existing methods in tag prediction have shown that the performance of prediction can be significantly improved by modeling users’ preferences. Ho...
Dawei Yin, Liangjie Hong, Brian D. Davison
CP
2004
Springer
14 years 1 months ago
Speeding Up Constraint Propagation
This paper presents a model and implementation techniques for speeding up constraint propagation. Two fundamental approaches to improving constraint propagation are explored: keepi...
Christian Schulte, Peter J. Stuckey
KDD
2004
ACM
285views Data Mining» more  KDD 2004»
14 years 1 months ago
Effective localized regression for damage detection in large complex mechanical structures
In this paper, we propose a novel data mining technique for the efficient damage detection within the large-scale complex mechanical structures. Every mechanical structure is defi...
Aleksandar Lazarevic, Ramdev Kanapady, Chandrika K...
JAIR
2010
181views more  JAIR 2010»
13 years 2 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton