Sciweavers

317 search results - page 42 / 64
» Who gives a tweet
Sort
View
IOR
2002
179views more  IOR 2002»
13 years 8 months ago
Decision Analysis: A Personal Account of How It Got Started and Evolved
Then these analytically motivated abstractions were gradually made more intricate as the body of mathematical techniques grew. The trend went from elementary analysis of complex, i...
Howard Raiffa
PKDD
2010
Springer
168views Data Mining» more  PKDD 2010»
13 years 7 months ago
Bayesian Knowledge Corroboration with Logical Rules and User Feedback
Current knowledge bases suffer from either low coverage or low accuracy. The underlying hypothesis of this work is that user feedback can greatly improve the quality of automatica...
Gjergji Kasneci, Jurgen Van Gael, Ralf Herbrich, T...
ASIACRYPT
2010
Springer
13 years 6 months ago
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures
sion of an extended abstract published in Proceedings of Asiacrypt 2010, Springer-Verlag, 2010. Available from the IACR Cryptology ePrint Archive as Report 2010/474. Beginning wit...
Sarah Meiklejohn, Hovav Shacham, David Mandell Fre...
CLOUDCOM
2010
Springer
13 years 6 months ago
A Study in Hadoop Streaming with Matlab for NMR Data Processing
Applying Cloud computing techniques for analyzing large data sets has shown promise in many data-driven scientific applications. Our approach presented here is to use Cloud comput...
Kalpa Gunaratna, Paul Anderson, Ajith Ranabahu, Am...
NAACL
2010
13 years 6 months ago
Detecting Emails Containing Requests for Action
Automatically finding email messages that contain requests for action can provide valuable assistance to users who otherwise struggle to give appropriate attention to the actionab...
Andrew Lampert, Robert Dale, Cécile Paris