Sciweavers

7379 search results - page 1106 / 1476
» How Many Clusters
Sort
View
COMPSAC
2004
IEEE
15 years 8 months ago
Safety Tactics for Software Architecture Design
The influence of architecture in assurance of system safety is being increasingly recognised in mission-critical software applications. Nevertheless, most architectural strategies...
Weihang Wu, Tim Kelly
COOPIS
2004
IEEE
15 years 8 months ago
Making Workflow Models Sound Using Petri Net Controller Synthesis
More and more companies use "process aware" information systems to make their business processes more efficient. To do this, workflow definitions must be formulated in a ...
Juliane Dehnert, Armin Zimmermann
AUSDM
2006
Springer
118views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Efficiently Identifying Exploratory Rules' Significance
How to efficiently discard potentially uninteresting rules in exploratory rule discovery is one of the important research foci in data mining. Many researchers have presented algor...
Shiying Huang, Geoffrey I. Webb
129
Voted
AUSDM
2006
Springer
114views Data Mining» more  AUSDM 2006»
15 years 8 months ago
Consolidated Trees: An Analysis of Structural Convergence
When different subsamples of the same data set are used to induce classification trees, the structure of the built classifiers is very different. The stability of the structure of ...
Jesús M. Pérez, Javier Muguerza, Ola...
CSB
2004
IEEE
106views Bioinformatics» more  CSB 2004»
15 years 8 months ago
A Theoretical Analysis of Gene Selection
A great deal of recent research has focused on the challenging task of selecting differentially expressed genes from microarray data (`gene selection'). Numerous gene selecti...
Sach Mukherjee, Stephen J. Roberts
« Prev « First page 1106 / 1476 Last » Next »