Sciweavers

1298 search results - page 216 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BIBE
2007
IEEE
127views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
Gene Selection via Matrix Factorization
The recent development of microarray gene expression techniques have made it possible to offer phenotype classification of many diseases. However, in gene expression data analysis...
Fei Wang, Tao Li
TVCG
2012
185views Hardware» more  TVCG 2012»
13 years 4 months ago
Interest Driven Navigation in Visualization
—This paper describes a new method to explore and discover within a large data set. We apply techniques from preference elicitation to automatically identify data elements that a...
Christopher G. Healey, Brent M. Dennis
153
Voted
TKDE
2010
186views more  TKDE 2010»
15 years 10 days ago
A Unified Framework for Providing Recommendations in Social Tagging Systems Based on Ternary Semantic Analysis
—Social Tagging is the process by which many users add metadata in the form of keywords, to annotate and categorize items (songs, pictures, web links, products, etc.). Social tag...
Panagiotis Symeonidis, Alexandros Nanopoulos, Yann...
ACSAC
2007
IEEE
15 years 8 months ago
Establishing and Sustaining System Integrity via Root of Trust Installation
Integrity measurements provide a means by which distributed systems can assess the trustability of potentially compromised remote hosts. However, current measurement techniques si...
Luke St. Clair, Joshua Schiffman, Trent Jaeger, Pa...
124
Voted
JOCN
2010
126views more  JOCN 2010»
15 years 12 days ago
Evidence for Early Morphological Decomposition in Visual Word Recognition
■ We employ a single-trial correlational MEG analysis technique to investigate early processing in the visual recognition of morphologically complex words. Three classes of affi...
Olla Solomyak, Alec Marantz