Sciweavers

14306 search results - page 2728 / 2862
» Database System Concepts
Sort
View
COLING
2010
14 years 5 months ago
Exploiting Paraphrases and Deferred Sense Commitment to Interpret Questions more Reliably
Creating correct, semantic representations of questions is essential for applications that can use formal reasoning to answer them. However, even within a restricted domain, it is...
Peter Clark, Philip Harrison
PAMI
2011
14 years 5 months ago
Latent Fingerprint Matching
Latent fingerprint identification is of critical importance in forensics. While tremendous progress has been made in the field of automatic fingerprint identification, latent...
Anil K. Jain, Jianjiang Feng
WWW
2011
ACM
14 years 4 months ago
Trust analysis with clustering
Web provides rich information about a variety of objects. Trustability is a major concern on the web. Truth establishment is an important task so as to provide the right informati...
Manish Gupta, Yizhou Sun, Jiawei Han
EJASP
2010
132views more  EJASP 2010»
14 years 4 months ago
Uncovering Transcriptional Regulatory Networks by Sparse Bayesian Factor Model
The problem of uncovering transcriptional regulation by transcription factors (TFs) based on microarray data is considered. A novel Bayesian sparse correlated rectified factor mod...
Jia Meng, Jianqiu Zhang, Yuan (Alan) Qi, Yidong Ch...
JMLR
2010
185views more  JMLR 2010»
14 years 4 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
« Prev « First page 2728 / 2862 Last » Next »