Sciweavers

1298 search results - page 191 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
124
Voted
ICPPW
2002
IEEE
15 years 8 months ago
Hebbian Algorithms for a Digital Library Recommendation System
generally meta-data, so that documents on any specific subject can be transparently retrieved. While quality control can in principle still rely on the traditional methods of peer-...
Francis Heylighen, Johan Bollen
130
Voted
CVPR
2007
IEEE
15 years 9 months ago
Hierarchical Structuring of Data on Manifolds
Manifold learning methods are promising data analysis tools. However, if we locate a new test sample on the manifold, we have to find its embedding by making use of the learned e...
Jun Li, Pengwei Hao
171
Voted
BMCBI
2006
183views more  BMCBI 2006»
15 years 3 months ago
Mining gene expression data by interpreting principal components
Background: There are many methods for analyzing microarray data that group together genes having similar patterns of expression over all conditions tested. However, in many insta...
Joseph C. Roden, Brandon W. King, Diane Trout, Ali...
SIGIR
1999
ACM
15 years 7 months ago
Deriving Concept Hierarchies from Text
This paper presents a means of automatically deriving a hierarchical organization of concepts from a set of documents without use of training data or standard clustering technique...
Mark Sanderson, W. Bruce Croft
110
Voted
PG
2007
IEEE
15 years 9 months ago
Precomputed Visibility Cuts for Interactive Relighting with Dynamic BRDFs
This paper presents a novel PRT-based method that uses precomputed visibility cuts for interactive relighting with all-frequency environment maps and arbitrary dynamic BRDFs. Our ...
Oskar Åkerlund, Mattias Unger, Rui Wang