Sciweavers

1891 search results - page 264 / 379
» Interactive Analysis of Computer Crimes
Sort
View
CIBCB
2005
IEEE
15 years 6 months ago
A Transcriptional Approach to Gene Clustering
— We present an integrative method for clustering coregulated genes and elucidating their underlying regulatory mechanisms. We use multi-state partition functions and thermodynam...
Ilias Tagkopoulos
CISS
2008
IEEE
15 years 4 months ago
Detection of anomalous meetings in a social network
Abstract-- When monitoring interactions within a social network, meetings or contacts between different members of the network are recorded. This paper addresses the problem of usi...
Jorge Silva, Rebecca Willett
SOCA
2008
IEEE
15 years 4 months ago
Log-based mining techniques applied to Web service composition reengineering
There is no doubt that SOA and BPM will continue to evolve dependently for the next ten years. Preparing common research infrastructures will require most important efforts of web ...
Walid Gaaloul, Karim Baïna, Claude Godart
PPSN
2010
Springer
15 years 3 months ago
Towards Analyzing Recombination Operators in Evolutionary Search
Recombination (also called crossover) operators are widely used in EAs to generate offspring solutions. Although the usefulness of recombination has been well recognized, theoretic...
Yang Yu, Chao Qian, Zhi-Hua Zhou
AND
2010
15 years 2 months ago
A platform for storing, visualizing, and interpreting collections of noisy documents
The goal of document image analysis is to produce interpretations that match those of a uent and knowledgeable human when viewing the same input. Because computer vision technique...
Bart Lamiroy, Daniel P. Lopresti