• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 1,308
Next 10 →

Dropout from higher education: A theoretical synthesis of recent research

by Vincent Tinto - Review of Educational Research , 1975
"... Despite the very extensive literature on dropout from higher education, much remains unknown about the nature of the dropout process. In large measure, the failure of past research to delineate more clearly the multiple characteristics of dropout can be traced to two major shortcomings; namely, inad ..."
Abstract - Cited by 798 (2 self) - Add to MetaCart
Despite the very extensive literature on dropout from higher education, much remains unknown about the nature of the dropout process. In large measure, the failure of past research to delineate more clearly the multiple characteristics of dropout can be traced to two major shortcomings; namely

X-means: Extending K-means with Efficient Estimation of the Number of Clusters

by Dau Pelleg, Andrew Moore - In Proceedings of the 17th International Conf. on Machine Learning , 2000
"... Despite its popularity for general clustering, K-means suffers three major shortcomings; it scales poorly computationally, the number of clusters K has to be supplied by the user, and the search is prone to local minima. We propose solutions for the first two problems, and a partial remedy for the t ..."
Abstract - Cited by 418 (5 self) - Add to MetaCart
Despite its popularity for general clustering, K-means suffers three major shortcomings; it scales poorly computationally, the number of clusters K has to be supplied by the user, and the search is prone to local minima. We propose solutions for the first two problems, and a partial remedy

A logic of implicit and explicit belief

by Hector J. Levesque - In Proceedings of the National Conference on Artificial Intelligence (AAAI’84 , 1984
"... As part of an on-going project to understand the found* tions of Knowledge Representation, we are attempting to characterize a kind of belief that forms a more appropriate basis for Knowledge Representation systems than that cap tured by the usual possible-world formalizations begun by Hintikka. In ..."
Abstract - Cited by 315 (8 self) - Add to MetaCart
. In this paper, we point out deficiencies in current semantic treatments of knowledge and belief (including re-cent syntactic approaches) and suggest a new analysis in the form of a logic that avoids these shortcomings and is also more viable computationally. The kind of belief that underlies terms in AI

Bias plus variance decomposition for zero-one loss functions

by Ron Kohavi - In Machine Learning: Proceedings of the Thirteenth International Conference , 1996
"... We present a bias-variance decomposition of expected misclassi cation rate, the most commonly used loss function in supervised classi cation learning. The bias-variance decomposition for quadratic loss functions is well known and serves as an important tool for analyzing learning algorithms, yet no ..."
Abstract - Cited by 212 (5 self) - Add to MetaCart
no decomposition was o ered for the more commonly used zero-one (misclassi cation) loss functions until the recent work of Kong & Dietterich (1995) and Breiman (1996). Their decomposition su ers from some major shortcomings though (e.g., potentially negative variance), which our decomposition avoids. We show

Filterbank-based fingerprint matching

by Anil K. Jain, Salil Prabhakar, Lin Hong, Sharath Pankanti - IEEE TRANSACTIONS ON IMAGE PROCESSING , 2000
"... With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications, biometrics-based verification, especially fingerprint-based identification, is receiving a lot of attention. There are two major shor ..."
Abstract - Cited by 219 (26 self) - Add to MetaCart
With identity fraud in our society reaching unprecedented proportions and with an increasing emphasis on the emerging automatic personal identification applications, biometrics-based verification, especially fingerprint-based identification, is receiving a lot of attention. There are two major

A Holistic Lexicon-Based Approach to Opinion Mining

by Xiaowen Ding, Bing Liu, Philip S. Yu , 2008
"... One of the important types of information on the Web is the opinions expressed in the user generated content, e.g., customer reviews of products, forum posts, and blogs. In this paper, we focus on customer reviews of products. In particular, we study the problem of determining the semantic orientati ..."
Abstract - Cited by 186 (11 self) - Add to MetaCart
are words that express desirable (e.g., great, amazing, etc.) or undesirable (e.g., bad, poor, etc) states. These approaches, however, all have some major shortcomings. In this paper, we propose a holistic lexicon-based approach to solving the problem by exploiting external evidences and linguistic

Topic Paper Comparison of Major Advantages and Shortcomings of Distance Introduction to Distance Education Education

by Dr. Brian Beatty , 2005
"... Education is no longer limited to the classroom environment. New ways of teaching and learning are being developed mainly to reach a greater number of students. These new methods offer maximum amount of flexibility to students as well as educators. ..."
Abstract - Add to MetaCart
Education is no longer limited to the classroom environment. New ways of teaching and learning are being developed mainly to reach a greater number of students. These new methods offer maximum amount of flexibility to students as well as educators.

Robust Defenses for Cross-Site Request Forgery

by Adam Barth, et al. , 2008
"... Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability. In this paper, we present a new variation on CSRF attacks, login CSRF, in which the attacker forges a cross-site request to the login form, logging the victim into the honest web site as the attacker. The severity of a l ..."
Abstract - Cited by 167 (10 self) - Add to MetaCart
login CSRF vulnerability varies by site, but it can be as severe as a cross-site scripting vulnerability. We detail three major CSRF defense techniques and find shortcomings with each technique. Although the HTTP Referer header could provide an effective defense, our experimental observation of 283

ON ENGINEERING CLOUD APPLICATIONS- STATE OF THE ART, SHORTCOMINGS ANALYSIS, AND APPROACH

by Yehia Taher, Dinh Khoa Nguyen, Francesco Lelli, Willem-jan Van, Den Heuvel, Mike P
"... Abstract. Recently, Cloud Computing has become an emerging research topic in response to the shift from product-oriented economy to service-oriented economy and the move from focusing on software/system development to addressing business-IT alignment. From the IT perspectives, there is a proliferati ..."
Abstract - Add to MetaCart
proliferation of methods for cloud application development. Such methods have clearly shown considerable shortcomings to provide an efficient solution to deal with major aspects related to cloud applications. One of these major aspects is the multi-tenancy of the Software-as-a-Service (SaaS) components used

Scientific Shortcomings in the EPA’s Endangerment Finding from Greenhouse Gases

by Patrick J. Michaels , 2009
"... issued a finding of “proposed endangerment ” from climate change caused by six greenhouse gases, with the largest contributions to warming resulting from emissions of carbon dioxide and methane (EPA 2009a). The EPA also referred to this document as a “proposed finding ” in response to a 2007 decisio ..."
Abstract - Add to MetaCart
on which the proposed findings are based, the methodology used in obtaining and analyzing the data, and major legal interpretations and policy considerations underlying the proposed findings”
Next 10 →
Results 1 - 10 of 1,308
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University