Sciweavers

1748 search results - page 228 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
CLUSTER
2002
IEEE
15 years 8 months ago
Noncontiguous I/O through PVFS
With the tremendous advances in processor and memory technology, I/O has risen to become the bottleneck in high-performance computing for many applications. The development of par...
Avery Ching, Alok N. Choudhary, Wei-keng Liao, Rob...
TISSEC
2008
106views more  TISSEC 2008»
15 years 3 months ago
On predictive models and user-drawn graphical passwords
In commonplace text-based password schemes, users typically choose passwords that are easy to recall, exhibit patterns, and are thus vulnerable to brute-force dictionary attacks. ...
Paul C. van Oorschot, Julie Thorpe
BMCBI
2007
148views more  BMCBI 2007»
15 years 3 months ago
Evaluation of gene-expression clustering via mutual information distance measure
Background: The definition of a distance measure plays a key role in the evaluation of different clustering solutions of gene expression profiles. In this empirical study we compa...
Ido Priness, Oded Maimon, Irad E. Ben-Gal
JUCS
2007
91views more  JUCS 2007»
15 years 3 months ago
Generative Instructional Engineering of Competence Development Programmes
: Competence development programmes are collections of units of learning and learning activities used to increase the overall effective performance of a learner within a certain ta...
Juan Manuel Dodero, Salvador Sánchez Alonso...
IJCNN
2006
IEEE
15 years 9 months ago
Support Vector Machines to Weight Voters in a Voting System of Entity Extractors
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...