Sciweavers

680 search results - page 95 / 136
» Locating Hidden Servers
Sort
View
BMCBI
2004
114views more  BMCBI 2004»
14 years 9 months ago
HMM Logos for visualization of protein families
Background: Profile Hidden Markov Models (pHMMs) are a widely used tool for protein family research. Up to now, however, there exists no method to visualize all of their central a...
Benjamin Schuster-Böckler, Jörg Schultz,...
ICMI
2010
Springer
172views Biometrics» more  ICMI 2010»
14 years 7 months ago
Modelling and analyzing multimodal dyadic interactions using social networks
Social network analysis became a common technique used to model and quantify the properties of social interactions. In this paper, we propose an integrated framework to explore th...
Sergio Escalera, Petia Radeva, Jordi Vitrià...
CORR
2011
Springer
196views Education» more  CORR 2011»
14 years 1 months ago
Privacy-Enhanced Reputation-Feedback Methods to Reduce Feedback Extortion in Online Auctions
In this paper, we study methods for improving the utility and privacy of reputation scores for online auctions, such as used in eBay, so as to reduce the effectiveness of feedbac...
Michael T. Goodrich, Florian Kerschbaum
KDD
2012
ACM
194views Data Mining» more  KDD 2012»
13 years 5 days ago
A sparsity-inducing formulation for evolutionary co-clustering
Traditional co-clustering methods identify block structures from static data matrices. However, the data matrices in many applications are dynamic; that is, they evolve smoothly o...
Shuiwang Ji, Wenlu Zhang, Jun Liu
ICDE
2008
IEEE
94views Database» more  ICDE 2008»
15 years 11 months ago
On Monitoring the top-k Unsafe Places
In a city, protecting units like police cars move around and protect places such as banks and residential buildings. Different places may have different requirements in how many p...
Donghui Zhang, Yang Du, Ling Hu