Sciweavers

9572 search results - page 1800 / 1915
» Cover Algorithms and Their Combination
Sort
View
110
Voted
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
16 years 1 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
KDD
2002
ACM
148views Data Mining» more  KDD 2002»
16 years 1 months ago
Tumor cell identification using features rules
Advances in imaging techniques have led to large repositories of images. There is an increasing demand for automated systems that can analyze complex medical images and extract me...
Bin Fang, Wynne Hsu, Mong-Li Lee
115
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Transforming data to satisfy privacy constraints
Data on individuals and entities are being collected widely. These data can contain information that explicitly identifies the individual (e.g., social security number). Data can ...
Vijay S. Iyengar
117
Voted
KDD
2002
ACM
157views Data Mining» more  KDD 2002»
16 years 1 months ago
Learning nonstationary models of normal network traffic for detecting novel attacks
Traditional intrusion detection systems (IDS) detect attacks by comparing current behavior to signatures of known attacks. One main drawback is the inability of detecting new atta...
Matthew V. Mahoney, Philip K. Chan
207
Voted
POPL
2008
ACM
16 years 1 months ago
Cyclic proofs of program termination in separation logic
We propose a novel approach to proving the termination of heapmanipulating programs, which combines separation logic with cyclic proof within a Hoare-style proof system. Judgement...
James Brotherston, Richard Bornat, Cristiano Calca...
« Prev « First page 1800 / 1915 Last » Next »