Sciweavers

50 search results - page 8 / 10
» Utility of Knowledge Extracted from Unsanitized Data when Ap...
Sort
View
ADC
2005
Springer
183views Database» more  ADC 2005»
14 years 1 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
SC
2005
ACM
14 years 1 months ago
The MHETA Execution Model for Heterogeneous Clusters
The availability of inexpensive “off the shelf” machines increases the likelihood that parallel programs run on heterogeneous clusters of machines. These programs are increasi...
Mario Nakazawa, David K. Lowenthal, Wenduo Zhou
AAAI
2008
13 years 9 months ago
Transfer Learning via Dimensionality Reduction
Transfer learning addresses the problem of how to utilize plenty of labeled data in a source domain to solve related but different problems in a target domain, even when the train...
Sinno Jialin Pan, James T. Kwok, Qiang Yang
ICPR
2006
IEEE
14 years 8 months ago
A Higher-Order Active Contour Model for Tree Detection
We present a model of a `gas of circles', the ensemble of regions in the image domain consisting of an unknown number of circles with approximately fixed radius and short ran...
Peter Horvath, Ian Jermyn, Zoltan Kato, and Josian...
AAAI
2004
13 years 9 months ago
Spatial Aggregation for Qualitative Assessment of Scientific Computations
Qualitative assessment of scientific computations is an emerging application area that applies a data-driven approach to characterize, at a high level, phenomena including conditi...
Chris Bailey-Kellogg, Naren Ramakrishnan