Sciweavers

2006 search results - page 231 / 402
» Heuristic Security-Testing Methods
Sort
View
AIA
2007
15 years 6 months ago
Adaptive preference elicitation for top-K recommendation tasks using GAI-networks
The enormous number of questions needed to acquire a full preference model when the size of the outcome space is large forces us to work with partial models that approximate the u...
Sérgio R. de M. Queiroz
BCSHCI
2008
15 years 6 months ago
Evaluation instruments for creativity support tools
Significant research has been dedicated to the development of creativity support tools, tools intended to amplify human creativity in the arts, sciences, and design disciplines. W...
Celine Latulipe, Michael Terry
CATS
2008
15 years 6 months ago
The Core Concept for 0/1 Integer Programming
In this paper we examine an extension of the core concept for the 0/1 Multidimensional Knapsack Problem (MKP) towards general 0/1 Integer Programming (IP) by allowing negative pro...
Samuel Huston, Jakob Puchinger, Peter J. Stuckey
IADIS
2008
15 years 6 months ago
Aggregation in Confidence-Based Concept Discovery for Multi-Relational Data Mining
Multi-relational data mining has become popular due to the limitations of propositional problem definition in structured domains and the tendency of storing data in relational dat...
Yusuf Kavurucu, Pinar Senkul, Ismail Hakki Toroslu
HCI
2007
15 years 6 months ago
FPF-SB : A Scalable Algorithm for Microarray Gene Expression Data Clustering
Efficient and effective analysis of large datasets from microarray gene expression data is one of the keys to time-critical personalized medicine. The issue we address here is the ...
Filippo Geraci, Mauro Leoncini, Manuela Montangero...