Sciweavers

1298 search results - page 244 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
TCSV
2008
94views more  TCSV 2008»
15 years 1 months ago
Human Activity Recognition Based on Silhouette Directionality
Recent advances in computer vision and pattern recognition have fuelled numerous initiatives that aim to intelligently recognize human activities. In this paper, we propose an algo...
Meghna Singh, Anup Basu, Mrinal K. Mandal
146
Voted
BMCBI
2010
153views more  BMCBI 2010»
15 years 2 months ago
GOAL: A software tool for assessing biological significance of genes groups
Background: Modern high throughput experimental techniques such as DNA microarrays often result in large lists of genes. Computational biology tools such as clustering are then us...
Alain B. Tchagang, Alexander Gawronski, Hugo B&eac...
DT
2000
88views more  DT 2000»
15 years 1 months ago
Postsilicon Validation Methodology for Microprocessors
f abstraction as applicable to break the problem's complexity, and innovating better techniques to address complexity of new microarchitectural features. Validation techniques...
Hemant G. Rotithor
SNAM
2011
246views more  SNAM 2011»
14 years 8 months ago
Market basket analysis with networks
The field of market basket analysis, the search for meaningful associations in customer purchase data, is one of the oldest areas of data mining. The typical solution involves th...
Troy Raeder, Nitesh V. Chawla
WCE
2007
15 years 3 months ago
Scenario Generation Employing Copulas
—Multistage stochastic programs are effective for solving long-term planning problems under uncertainty. Such programs are usually based on scenario generation model about future...
Kristina Sutiene, Henrikas Pranevicius