Sciweavers

3556 search results - page 691 / 712
» Can machine learning be secure
Sort
View
IDA
2009
Springer
14 years 10 months ago
Estimating Hidden Influences in Metabolic and Gene Regulatory Networks
We address the applicability of blind source separation (BSS) methods for the estimation of hidden influences in biological dynamic systems such as metabolic or gene regulatory net...
Florian Blöchl, Fabian J. Theis
BMCBI
2010
161views more  BMCBI 2010»
14 years 10 months ago
Addressing the Challenge of Defining Valid Proteomic Biomarkers and Classifiers
Background: The purpose of this manuscript is to provide, based on an extensive analysis of a proteomic data set, suggestions for proper statistical analysis for the discovery of ...
Mohammed Dakna, Keith Harris, Alexandros Kalousis,...
140
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Using the kernel trick in compressive sensing: Accurate signal recovery from fewer measurements
Compressive sensing accurately reconstructs a signal that is sparse in some basis from measurements, generally consisting of the signal’s inner products with Gaussian random vec...
Hanchao Qi, Shannon Hughes
120
Voted
CIKM
2011
Springer
14 years 21 days ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...
112
Voted
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
13 years 8 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke