Sciweavers

440 search results - page 71 / 88
» A New Statistical Approach to Personal Name Extraction
Sort
View
TEI
2009
ACM
95views Hardware» more  TEI 2009»
15 years 4 months ago
Living interfaces: the intimate door lock
In this paper we introduce a new way to interact intimately with an automated system. The Intimate Door Lock investigates the psychological effects of intimate humanhuman interact...
Miriam Roy, Fabian Hemmert, Reto Wettach
BMCBI
2008
132views more  BMCBI 2008»
14 years 9 months ago
Very Important Pool (VIP) genes - an application for microarray-based molecular signatures
Background: Advances in DNA microarray technology portend that molecular signatures from which microarray will eventually be used in clinical environments and personalized medicin...
Zhenqiang Su, Huixiao Hong, Hong Fang, Leming M. S...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
15 years 1 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
JMLR
2010
116views more  JMLR 2010»
14 years 4 months ago
Feature Selection, Association Rules Network and Theory Building
As the size and dimensionality of data sets increase, the task of feature selection has become increasingly important. In this paper we demonstrate how association rules can be us...
Sanjay Chawla
SAC
2010
ACM
15 years 4 months ago
ESB federation for large-scale SOA
Embracing service-oriented architectures in the context of large systems, such as the Web, rises a set of new and challenging issues: increased size and load in terms of users and...
Françoise Baude, Imen Filali, Fabrice Huet,...