One of the primary issues with traditional anomaly detection approaches is their inability to handle complex, structural data. One approach to this issue involves the detection of...
Randomization has emerged as a useful technique for data disguising in privacy-preserving data mining. Its privacy properties have been studied in a number of papers. Kargupta et ...
This paper describes a method of systematically generating visual sensing strategies based on knowledge of the assembly task to be performed. Since visual sensing is usually perfo...
Many practitioners who use EM and related algorithms complain that they are sometimes slow. When does this happen, and what can be done about it? In this paper, we study the gener...
Ruslan Salakhutdinov, Sam T. Roweis, Zoubin Ghahra...
The web is fast maturing into an important marketing medium that provides businesses with the ability to undertake oneto-one marketing and provide personalised services to their cu...
Sarabjot S. Anand, Matthias Baumgarten, Alex G. B&...