Sciweavers

4660 search results - page 530 / 932
» Learning from imperfect data
Sort
View
JSS
2007
115views more  JSS 2007»
15 years 3 months ago
A case study in re-engineering to enforce architectural control flow and data sharing
Without rigorous software development and maintenance, software tends to lose its original architectural structure and become difficult to understand and modify. ArchJava, a recen...
Marwan Abi-Antoun, Jonathan Aldrich, Wesley Coelho
JMLR
2010
161views more  JMLR 2010»
14 years 10 months ago
Accuracy-Rejection Curves (ARCs) for Comparing Classification Methods with a Reject Option
Data extracted from microarrays are now considered an important source of knowledge about various diseases. Several studies based on microarray data and the use of receiver operat...
Malik Sajjad Ahmed Nadeem, Jean-Daniel Zucker, Bla...
FC
2010
Springer
171views Cryptology» more  FC 2010»
15 years 7 months ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
NIPS
2004
15 years 5 months ago
Probabilistic Inference of Alternative Splicing Events in Microarray Data
Alternative splicing (AS) is an important and frequent step in mammalian gene expression that allows a single gene to specify multiple products, and is crucial for the regulation ...
Ofer Shai, Brendan J. Frey, Quaid Morris, Qun Pan,...
TIFS
2008
154views more  TIFS 2008»
15 years 3 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen