Sciweavers

411 search results - page 59 / 83
» Evaluation and exploitation of knowledge robustness in knowl...
Sort
View
CORR
2004
Springer
112views Education» more  CORR 2004»
14 years 9 months ago
Swarms on Continuous Data
While being it extremely important, many Exploratory Data Analysis (EDA [21]) systems have the inhability to perform classification and visualization in a continuous basis or to se...
Vitorino Ramos, Ajith Abraham
WWW
2010
ACM
15 years 5 months ago
DSNotify: handling broken links in the web of data
The Web of Data has emerged as a way of exposing structured linked data on the Web. It builds on the central building blocks of the Web (URIs, HTTP) and benefits from its simplic...
Niko Popitsch, Bernhard Haslhofer
SIGIR
2009
ACM
15 years 4 months ago
Automatic video tagging using content redundancy
The analysis of the leading social video sharing platform YouTube reveals a high amount of redundancy, in the form of videos with overlapping or duplicated content. In this paper,...
Stefan Siersdorfer, José San Pedro, Mark Sa...
USS
2010
14 years 7 months ago
Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context
Reverse Turing tests, or CAPTCHAs, have become an ubiquitous defense used to protect open Web resources from being exploited at scale. An effective CAPTCHA resists existing mechan...
Marti Motoyama, Kirill Levchenko, Chris Kanich, Da...
BMCBI
2007
172views more  BMCBI 2007»
14 years 10 months ago
Bayesian approaches to reverse engineer cellular systems: a simulation study on nonlinear Gaussian networks
Background: Reverse engineering cellular networks is currently one of the most challenging problems in systems biology. Dynamic Bayesian networks (DBNs) seem to be particularly su...
Fulvia Ferrazzi, Paola Sebastiani, Marco Ramoni, R...