Sciweavers

6087 search results - page 1044 / 1218
» Knowledge discovery methods
Sort
View
CASES
2005
ACM
15 years 6 months ago
Micro embedded monitoring for security in application specific instruction-set processors
This paper presents a methodology for monitoring security in Application Specific Instruction-set Processors (ASIPs). This is a generalized methodology for inline monitoring insec...
Roshan G. Ragel, Sri Parameswaran, Sayed Mohammad ...
CEC
2005
IEEE
15 years 6 months ago
XCS with computed prediction in continuous multistep environments
We apply XCS with computed prediction (XCSF) to tackle multistep reinforcement learning problems involving continuous inputs. In essence we use XCSF as a method of generalized rein...
Pier Luca Lanzi, Daniele Loiacono, Stewart W. Wils...
CVPR
2005
IEEE
15 years 6 months ago
Database-Guided Segmentation of Anatomical Structures with Complex Appearance
The segmentation of anatomical structures has been traditionally formulated as a perceptual grouping task, and solved through clustering and variational approaches. However, such ...
Bogdan Georgescu, Xiang Sean Zhou, Dorin Comaniciu...
JCDL
2010
ACM
151views Education» more  JCDL 2010»
15 years 6 months ago
Domain-specific iterative readability computation
We present a new algorithm to measure domain-specific readability. It iteratively computes the readability of domainspecific resources based on the difficulty of domain-specific c...
Jin Zhao, Min-Yen Kan
BIBE
2007
IEEE
151views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
On the Effectiveness of Constraints Sets in Clustering Genes
—In this paper, we have modified a constrained clustering algorithm to perform exploratory analysis on gene expression data using prior knowledge presented in the form of constr...
Erliang Zeng, Chengyong Yang, Tao Li, Giri Narasim...
« Prev « First page 1044 / 1218 Last » Next »