Sciweavers

144 search results - page 29 / 29
» A descriptive study of Microsoft's threat modeling technique
Sort
View
TSMC
1998
93views more  TSMC 1998»
13 years 5 months ago
Toward a completely automatic neural-network-based human chromosome analysis
Abstract—The application of neural networks (NN’s) to automatic analysis of chromosome images is investigated in this paper. All aspects of the analysis, namely segmentation, f...
Boaz Lerner
KDD
2006
ACM
139views Data Mining» more  KDD 2006»
14 years 6 months ago
Generating semantic annotations for frequent patterns with context analysis
As a fundamental data mining task, frequent pattern mining has widespread applications in many different domains. Research in frequent pattern mining has so far mostly focused on ...
Qiaozhu Mei, Dong Xin, Hong Cheng, Jiawei Han, Che...
SDM
2009
SIAM
176views Data Mining» more  SDM 2009»
14 years 2 months ago
Discovery of Geospatial Discriminating Patterns from Remote Sensing Datasets.
Large amounts of remotely sensed data calls for data mining techniques to fully utilize their rich information content. In this paper, we study new means of discovery and summariz...
Wei Ding 0003, Tomasz F. Stepinski, Josue Salazar
IJAIT
2002
92views more  IJAIT 2002»
13 years 5 months ago
Extensible Information Brokers
The number and size of information services available on the internet has been growing exponentially over the past few years. This growth has created an urgent need for information...
Jianguo Lu, John Mylopoulos