Sciweavers

863 search results - page 130 / 173
» Computational Methods for Intelligent Information Access
Sort
View
139
Voted
BMCBI
2011
14 years 10 months ago
Meta-analysis of gene expression microarrays with missing replicates
Background: Many different microarray experiments are publicly available today. It is natural to ask whether different experiments for the same phenotypic conditions can be combin...
Fan Shi, Gad Abraham, Christopher Leckie, Izhak Ha...
123
Voted
DRM
2007
Springer
15 years 9 months ago
Randomized radon transforms for biometric authentication via fingerprint hashing
We present a new technique for generating biometric fingerprint hashes, or summaries of information contained in human fingerprints. Our method calculates and aggregates various...
Mariusz H. Jakubowski, Ramarathnam Venkatesan
144
Voted
SAC
2010
ACM
15 years 9 months ago
A semantic web-based approach for personalizing news
Hermes is an ontology-based framework for building news personalization services. This framework consists of a news classification phase, which classifies the news, a knowledge ...
Kim Schouten, Philip Ruijgrok, Jethro Borsje, Flav...
109
Voted
PAM
2009
Springer
15 years 10 months ago
Inferring Spammers in the Network Core
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern. Content-analysis techniques and blacklists, the m...
Dominik Schatzmann, Martin Burkhart, Thrasyvoulos ...
135
Voted
GECCO
2007
Springer
178views Optimization» more  GECCO 2007»
15 years 9 months ago
Transgenetic algorithm: a new evolutionary perspective for heuristics design
Transgenetic algorithms are evolutionary computing techniques based on living processes where cooperation is the main evolutionary strategy. Those processes contain the movement o...
Elizabeth Ferreira Gouvea Goldbarg, Marco Cé...