Sciweavers

1315 search results - page 240 / 263
» Discovering Classification from Data of Multiple Sources
Sort
View
SACMAT
2010
ACM
14 years 8 months ago
An architecture for enforcing end-to-end access control over web applications
The web is now being used as a general platform for hosting distributed applications like wikis, bulletin board messaging systems and collaborative editing environments. Data from...
Boniface Hicks, Sandra Rueda, Dave King 0002, Thom...
CIVR
2003
Springer
200views Image Analysis» more  CIVR 2003»
15 years 2 months ago
Multimedia Search with Pseudo-relevance Feedback
We present an algorithm for video retrieval that fuses the decisions of multiple retrieval agents in both text and image modalities. While the normalization and combination of evi...
Rong Yan, Alexander G. Hauptmann, Rong Jin
JAMIA
2010
115views more  JAMIA 2010»
14 years 4 months ago
The population health record: concepts, definition, design, and implementation
In 1997, the American Medical Informatics Association proposed a US information strategy that included a population health record (PopHR). Despite subsequent progress on the conce...
Daniel J. Friedman, R. Gibson Parrish II
BIBM
2008
IEEE
107views Bioinformatics» more  BIBM 2008»
15 years 4 months ago
A Functional Network of Yeast Genes Using Gene Ontology Information
In the post-genomic era, the organization of genes into networks has played an important role in characterizing the functions of individual genes and the interplay between them. I...
Erliang Zeng, Giri Narasimhan, Lisa Schneper, Kala...
97
Voted
VIZSEC
2005
Springer
15 years 3 months ago
A User-centered Look at Glyph-based Security Visualization
This paper presents the Intrusion Detection toolkit (IDtk), an information Visualization tool for intrusion detection (ID). IDtk was developed through a user-centered design proce...
Anita Komlodi, Penny Rheingans, Utkarsha Ayachit, ...