Sciweavers

7121 search results - page 1244 / 1425
» Functions as Session-Typed Processes
Sort
View
BMCBI
2007
207views more  BMCBI 2007»
15 years 4 months ago
Analyzing in situ gene expression in the mouse brain with image registration, feature extraction and block clustering
Background: Many important high throughput projects use in situ hybridization and may require the analysis of images of spatial cross sections of organisms taken with cellular lev...
Manjunatha Jagalur, Chris Pal, Erik G. Learned-Mil...
IPM
2008
141views more  IPM 2008»
15 years 4 months ago
Towards a unified approach to document similarity search using manifold-ranking of blocks
Document similarity search (i.e. query by example) aims to retrieve a ranked list of documents similar to a query document in a text corpus or on the Web. Most existing approaches...
Xiaojun Wan, Jianwu Yang, Jianguo Xiao
JMLR
2008
129views more  JMLR 2008»
15 years 4 months ago
Finite-Time Bounds for Fitted Value Iteration
In this paper we develop a theoretical analysis of the performance of sampling-based fitted value iteration (FVI) to solve infinite state-space, discounted-reward Markovian decisi...
Rémi Munos, Csaba Szepesvári
JSS
2008
217views more  JSS 2008»
15 years 4 months ago
MUSEMBLE: A novel music retrieval system with automatic voice query transcription and reformulation
So far, many researches have been done to develop efficient music retrieval systems, and query-by-humming has been considered as one of the most intuitive and effective query meth...
Seungmin Rho, Byeong-jun Han, Eenjun Hwang, Minkoo...
JMLR
2006
132views more  JMLR 2006»
15 years 4 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof
« Prev « First page 1244 / 1425 Last » Next »