Sciweavers

1456 search results - page 189 / 292
» Two Techniques to Improve Finite Model Search
Sort
View
SRDS
2006
IEEE
14 years 2 months ago
How To Safeguard Your Sensitive Data
In order to safeguard a sensitive database, we must ensure both its privacy and its longevity. However, privacy and longevity tend to be competing objectives. We show how to desig...
Bob Mungamuru, Hector Garcia-Molina, Subhasish Mit...
ICDM
2006
IEEE
145views Data Mining» more  ICDM 2006»
14 years 2 months ago
Stability Region Based Expectation Maximization for Model-based Clustering
In spite of the initialization problem, the ExpectationMaximization (EM) algorithm is widely used for estimating the parameters in several data mining related tasks. Most popular ...
Chandan K. Reddy, Hsiao-Dong Chiang, Bala Rajaratn...
APBC
2003
135views Bioinformatics» more  APBC 2003»
13 years 9 months ago
The Visualization and Measurement of Left Ventricular Deformation
While medical progress has been made in the diagnosis and treatment of heart diseases it remains the biggest killer in the western world. Cardiovascular diseases cause considerabl...
Burkhard Wünsche
ECIR
2009
Springer
14 years 5 months ago
"They Are Out There, If You Know Where to Look": Mining Transliterations of OOV Query Terms for Cross-Language Information Retri
It is well known that the use of a good Machine Transliteration system improves the retrieval performance of Cross-Language Information Retrieval (CLIR) systems when the query and ...
Raghavendra Udupa, K. Saravanan, Anton Bakalov, Ab...
AAAI
2010
13 years 9 months ago
Hydra: Automatically Configuring Algorithms for Portfolio-Based Selection
The AI community has achieved great success in designing high-performance algorithms for hard combinatorial problems, given both considerable domain knowledge and considerable eff...
Lin Xu, Holger Hoos, Kevin Leyton-Brown