Sciweavers

415 search results - page 20 / 83
» Intruders pattern identification
Sort
View
FLAIRS
2006
14 years 11 months ago
Melody Track Identification in Music Symbolic Files
Standard MIDI files contain data that can be considered as a symbolic representation of music (a digital score), and most of them are structured as a number of tracks, one of them...
David Rizo, Pedro J. Ponce de León, Antonio...
BIBM
2010
IEEE
173views Bioinformatics» more  BIBM 2010»
14 years 7 months ago
Network-based identification of smoking-associated gene signature for lung cancer
This study presents a novel computational approach to identifying a smoking-associated gene signature. The methodology contains the following steps: 1) identifying genes significa...
Ying-Wooi Wan, Changchang Xiao, Nancy Lan Guo
WWW
2007
ACM
15 years 10 months ago
Towards extracting flickr tag semantics
We address the problem of extracting semantics of tags ? short, unstructured text-labels assigned to resources on the Web ? based on each tag's metadata patterns. In particul...
Tye Rattenbury, Nathan Good, Mor Naaman
AIRWEB
2008
Springer
14 years 12 months ago
Web spam identification through content and hyperlinks
We present an algorithm, witch, that learns to detect spam hosts or pages on the Web. Unlike most other approaches, it simultaneously exploits the structure of the Web graph as we...
Jacob Abernethy, Olivier Chapelle, Carlos Castillo
COLING
2010
14 years 4 months ago
Bipolar Person Name Identification of Topic Documents Using Principal Component Analysis
In this paper, we propose an unsupervised approach for identifying bipolar person names in a set of topic documents. We employ principal component analysis (PCA) to discover bipol...
Chien Chin Chen, Chen-Yuan Wu