Sciweavers

2606 search results - page 422 / 522
» cost 2008
Sort
View
SDM
2008
SIAM
135views Data Mining» more  SDM 2008»
13 years 10 months ago
A Spamicity Approach to Web Spam Detection
Web spam, which refers to any deliberate actions bringing to selected web pages an unjustifiable favorable relevance or importance, is one of the major obstacles for high quality ...
Bin Zhou 0002, Jian Pei, ZhaoHui Tang
SDM
2008
SIAM
165views Data Mining» more  SDM 2008»
13 years 10 months ago
On the Dangers of Cross-Validation. An Experimental Evaluation
Cross validation allows models to be tested using the full training set by means of repeated resampling; thus, maximizing the total number of points used for testing and potential...
R. Bharat Rao, Glenn Fung
SODA
2008
ACM
82views Algorithms» more  SODA 2008»
13 years 10 months ago
A plant location guide for the unsure
This paper studies an extension of the k-median problem where we are given a metric space (V, d) and not just one but m client sets {Si V }m i=1, and the goal is to open k facili...
Barbara M. Anthony, Vineet Goyal, Anupam Gupta, Vi...
AIPS
2009
13 years 10 months ago
Preferred Operators and Deferred Evaluation in Satisficing Planning
Heuristic forward search is the dominant approach to satisficing planning to date. Most successful planning systems, however, go beyond plain heuristic search by employing various...
Silvia Richter, Malte Helmert
EVOW
2008
Springer
13 years 10 months ago
Particle Swarm Optimization for Tackling Continuous Review Inventory Models
We propose an alternative algorithm for solving continuous review inventory model problems for deteriorating items over a ļ¬nite horizon. Our interest focuses on the case of timeā...
Konstantinos E. Parsopoulos, K. Skouri, Michael N....