Sciweavers

2504 search results - page 368 / 501
» Methods for comparing rankings of search engine results
Sort
View
IJON
2008
88views more  IJON 2008»
15 years 1 months ago
Neural network construction and training using grammatical evolution
The term neural network evolution usually refers to network topology evolution leaving the network's parameters to be trained using conventional algorithms. In this paper we ...
Ioannis G. Tsoulos, Dimitris Gavrilis, Euripidis G...
KDD
1998
ACM
80views Data Mining» more  KDD 1998»
15 years 5 months ago
Human Performance on Clustering Web Pages: A Preliminary Study
With the increase in information on the World Wide Web it has become difficult to quickly find desired information without using multiple queries or using a topic-specific search ...
Sofus A. Macskassy, Arunava Banerjee, Brian D. Dav...
94
Voted
CCS
2007
ACM
15 years 7 months ago
Predicting vulnerable software components
Where do most vulnerabilities occur in software? Our Vulture tool automatically mines existing vulnerability databases and version archives to map past vulnerabilities to componen...
Stephan Neuhaus, Thomas Zimmermann, Christian Holl...
ALMOB
2008
124views more  ALMOB 2008»
15 years 1 months ago
A scoring matrix approach to detecting miRNA target sites
Background: Experimental identification of microRNA (miRNA) targets is a difficult and time consuming process. As a consequence several computational prediction methods have been ...
Simon Moxon, Vincent Moulton, Jan T. Kim
CIVR
2010
Springer
160views Image Analysis» more  CIVR 2010»
15 years 6 months ago
Today's and tomorrow's retrieval practice in the audiovisual archive
Content-based video retrieval is maturing to the point where it can be used in real-world retrieval practices. One such practice is the audiovisual archive, whose users increasing...
Bouke Huurnink, Cees G. M. Snoek, Maarten de Rijke...