Sciweavers

2084 search results - page 192 / 417
» Knowledge Exploitation from the Web
Sort
View
BMCBI
2010
143views more  BMCBI 2010»
15 years 26 days ago
Learning gene regulatory networks from only positive and unlabeled data
Background: Recently, supervised learning methods have been exploited to reconstruct gene regulatory networks from gene expression data. The reconstruction of a network is modeled...
Luigi Cerulo, Charles Elkan, Michele Ceccarelli
225
Voted
PAMI
2011
14 years 7 months ago
3D Face Reconstruction from a Single Image Using a Single Reference Face Shape
—Human faces are remarkably similar in global properties, including size, aspect ratio, and location of main features, but can vary considerably in details across individuals, ge...
Ira Kemelmacher-Shlizerman, Ronen Basri
115
Voted
WWW
2005
ACM
16 years 1 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
125
Voted
WWW
2007
ACM
16 years 1 months ago
Bridging the gap between OWL and relational databases
Schema statements in OWL are interpreted quite differently from analogous statements in relational databases. If these statements are meant to be interpreted as integrity constrai...
Boris Motik, Ian Horrocks, Ulrike Sattler
100
Voted
SEMWEB
2007
Springer
15 years 6 months ago
An Ontology Design Pattern for Representing Relevance in OWL
Abstract. Design patterns are widely-used software engineering abstractions which define guidelines for modeling common application scenarios. Ontology design patterns are the ext...
Fernando Bobillo, Miguel Delgado, Juan Góme...