Sciweavers

1056 search results - page 109 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
123
Voted
ISBRA
2009
Springer
15 years 8 months ago
A Linear-Time Algorithm for Analyzing Array CGH Data Using Log Ratio Triangulation
Abstract. DNA copy number is the number of replicates of a contiguous segment of DNA on the genome. Copy number alteration (CNA) is a genetic abnormality in which the number of the...
Matthew Hayes, Jing Li
115
Voted
IAT
2009
IEEE
15 years 8 months ago
Social Trust-Aware Recommendation System: A T-Index Approach
Collaborative Filtering based on similarity suffers from a variety of problems such as sparsity and scalability. In this paper, we propose an ontological model of trust between us...
Alireza Zarghami, Soude Fazeli, Nima Dokoohaki, Mi...
ICASSP
2009
IEEE
15 years 8 months ago
Automatic musical meter detection
A method that automatically estimates the metrical structure of a piece of music is presented. The approach is based on the generation of a beat similarity matrix, which provides ...
Mikel Gainza
107
Voted
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
15 years 8 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
116
Voted
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
15 years 8 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu