Sciweavers

5463 search results - page 1025 / 1093
» Evaluating algorithms that learn from data streams
Sort
View
101
Voted
CCS
2004
ACM
15 years 6 months ago
Web tap: detecting covert web traffic
As network security is a growing concern, system administrators lock down their networks by closing inbound ports and only allowing outbound communication over selected protocols ...
Kevin Borders, Atul Prakash
TSE
2008
165views more  TSE 2008»
15 years 14 days ago
A Systematic Study of Failure Proximity
Software end users are the best testers, who keep revealing bugs in software that has undergone rigorous in-house testing. In order to leverage their testing efforts, failure repor...
Chao Liu 0001, Xiangyu Zhang, Jiawei Han
WWW
2008
ACM
16 years 1 months ago
Query-sets: using implicit feedback and query patterns to organize web documents
In this paper we present a new document representation model based on implicit user feedback obtained from search engine queries. The main objective of this model is to achieve be...
Barbara Poblete, Ricardo A. Baeza-Yates
127
Voted
BMCBI
2006
175views more  BMCBI 2006»
15 years 19 days ago
Parameter estimation for stiff equations of biosystems using radial basis function networks
Background: The modeling of dynamic systems requires estimating kinetic parameters from experimentally measured time-courses. Conventional global optimization methods used for par...
Yoshiya Matsubara, Shinichi Kikuchi, Masahiro Sugi...
BMCBI
2006
100views more  BMCBI 2006»
15 years 19 days ago
Using the nucleotide substitution rate matrix to detect horizontal gene transfer
Background: Horizontal gene transfer (HGT) has allowed bacteria to evolve many new capabilities. Because transferred genes perform many medically important functions, such as conf...
Micah Hamady, M. D. Betterton, Rob Knight
« Prev « First page 1025 / 1093 Last » Next »