Sciweavers

1486 search results - page 184 / 298
» Firewall Rules Analysis
Sort
View
TCBB
2011
14 years 11 months ago
Data Mining on DNA Sequences of Hepatitis B Virus
: Extraction of meaningful information from large experimental datasets is a key element of bioinformatics research. One of the challenges is to identify genomic markers in Hepatit...
Kwong-Sak Leung, Kin-Hong Lee, Jin Feng Wang, Eddi...
CVPR
1998
IEEE
16 years 6 months ago
Probabilistic Reasoning Models for Face Recognition
We introduce in this paper two probabilistic reasoning models (PRM-1 and PRM-2) which combine the Principal Component Analysis (PCA) technique and the Bayes classifier and show th...
Chengjun Liu, Harry Wechsler
ICLP
2009
Springer
16 years 4 months ago
Attributed Data for CHR Indexing
Abstract. The overhead of matching CHR rules is alleviated by constraint store indexing. Attributed variables provide an efficient means of indexing on logical variables. Existing ...
Beata Sarna-Starosta, Tom Schrijvers
STOC
2007
ACM
117views Algorithms» more  STOC 2007»
16 years 4 months ago
A combinatorial, primal-dual approach to semidefinite programs
Semidefinite programs (SDP) have been used in many recent approximation algorithms. We develop a general primal-dual approach to solve SDPs using a generalization of the well-know...
Sanjeev Arora, Satyen Kale
ICSE
2004
IEEE-ACM
16 years 4 months ago
Mining Version Histories to Guide Software Changes
We apply data mining to version histories in order to guide programmers along related changes: "Programmers who changed these functions also changed...." Given a set of e...
Andreas Zeller, Peter Weißgerber, Stephan Di...