Sciweavers

24529 search results - page 414 / 4906
» Computing on Authenticated Data
Sort
View
SERVICES
2008
94views more  SERVICES 2008»
15 years 6 months ago
Using Characteristics of Computational Science Schemas for Workflow Metadata Management
Computational science workflows are generating an ever-increasing volume of data products. Metadata for these workflows is communicated using one or more discipline-specific schem...
Scott Jensen, Beth Plale
150
Voted
ACL
2003
15 years 6 months ago
A Word-Order Database for Testing Computational Models of Language Acquisition
An investment of effort over the last two years has begun to produce a wealth of data concerning computational psycholinguistic models of syntax acquisition. The data is generated...
William Gregory Sakas
ICMLA
2003
15 years 6 months ago
Robust Support Vector Machines for Anomaly Detection in Computer Security
— Using the 1998 DARPA BSM data set collected at MIT’s Lincoln Labs to study intrusion detection systems, the performance of robust support vector machines (RVSMs) was compared...
Wenjie Hu, Yihua Liao, V. Rao Vemuri
BMCBI
2008
87views more  BMCBI 2008»
15 years 4 months ago
Evaluation of two methods for computational HLA haplotypes inference using a real dataset
Background: HLA haplotype analysis has been used in population genetics and in the investigation of disease-susceptibility locus, due to its high polymorphism. Several methods for...
Bruno F. Bettencourt, Margarida R. Santos, Raquel ...
CORR
2008
Springer
86views Education» more  CORR 2008»
15 years 4 months ago
Fast computation of the median by successive binning
In many important problems, one uses the median instead of the mean to estimate a population's center, since the former is more robust. But in general, computing the median i...
Ryan J. Tibshirani