Sciweavers

170 search results - page 26 / 34
» An Effective Combination of Multiple Classifiers for Toxicit...
Sort
View
94
Voted
ISQED
2010
IEEE
156views Hardware» more  ISQED 2010»
15 years 1 months ago
On the design of different concurrent EDC schemes for S-Box and GF(p)
Recent studies have shown that an attacker can retrieve confidential information from cryptographic hardware (e.g. the secret key) by introducing internal faults. A secure and re...
Jimson Mathew, Hafizur Rahaman, Abusaleh M. Jabir,...
TREC
2001
15 years 1 months ago
Machine Learning Approach for Homepage Finding Task
This paper describes new machine learning approaches to predict the correct homepage in response to a user's homepage finding query. This involves two phases. In the first ph...
Wensi Xi, Edward A. Fox
WSDM
2012
ACM
296views Data Mining» more  WSDM 2012»
13 years 7 months ago
Inferring social ties across heterogenous networks
It is well known that different types of social ties have essentially different influence between people. However, users in online social networks rarely categorize their contact...
Jie Tang, Tiancheng Lou, Jon M. Kleinberg
GECCO
2003
Springer
160views Optimization» more  GECCO 2003»
15 years 4 months ago
Using Genetic Algorithms for Data Mining Optimization in an Educational Web-Based System
This paper presents an approach for classifying students in order to predict their final grade based on features extracted from logged data in an education web-based system. A comb...
Behrouz Minaei-Bidgoli, William F. Punch
BMCBI
2010
147views more  BMCBI 2010»
14 years 11 months ago
Indirect two-sided relative ranking: a robust similarity measure for gene expression data
Background: There is a large amount of gene expression data that exists in the public domain. This data has been generated under a variety of experimental conditions. Unfortunatel...
Louis Licamele, Lise Getoor