Sciweavers

1298 search results - page 238 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
BMCBI
2010
104views more  BMCBI 2010»
14 years 9 months ago
A systematic study of genome context methods: calibration, normalization and combination
Background: Genome context methods have been introduced in the last decade as automatic methods to predict functional relatedness between genes in a target genome using the patter...
Luciana Ferrer, Joseph M. Dale, Peter D. Karp
ISCA
1998
IEEE
135views Hardware» more  ISCA 1998»
15 years 6 months ago
Confidence Estimation for Speculation Control
Modern processors improve instruction level parallelism by speculation. The outcome of data and control decisions is predicted, and the operations are speculatively executed and o...
Dirk Grunwald, Artur Klauser, Srilatha Manne, Andr...
119
Voted
DAGSTUHL
2010
15 years 3 months ago
Generalized Hyper-cylinders: a Mechanism for Modeling and Visualizing N-D Objects
The display of surfaces and solids has usually been restricted to the domain of scientific visualization; however, little work has been done on the visualization of surfaces and s...
Matthew O. Ward, Zhenyu Guo
KDD
2003
ACM
129views Data Mining» more  KDD 2003»
16 years 2 months ago
Nantonac collaborative filtering: recommendation based on order responses
A recommender system suggests the items expected to be preferred by the users. Recommender systems use collaborative filtering to recommend items by summarizing the preferences of...
Toshihiro Kamishima
125
Voted
IROS
2006
IEEE
274views Robotics» more  IROS 2006»
15 years 8 months ago
Adaptive Scale Robust Segmentation for 2D Laser Scanner
Abstract— This paper presents a robust algorithm for segmentation and line detection in 2D range scans. The described method exploits the multimodal probability density function ...
Ruben Martinez-Cantin, José A. Castellanos,...