Sciweavers

235 search results - page 37 / 47
» On Challenges in Evaluating Malware Clustering
Sort
View
119
Voted
RULEML
2010
Springer
14 years 8 months ago
Visualizing Logical Dependencies in SWRL Rule Bases
Rule bases are common in many business rule applications, clinical decision support programs, and other types of intelligent systems. As the size of the rule bases grows and the in...
Saeed Hassanpour, Martin J. O'Connor, Amar K. Das
ERSA
2009
149views Hardware» more  ERSA 2009»
14 years 7 months ago
Harnessing Human Computation Cycles for the FPGA Placement Problem
Harnessing human computation is an approach to find problem solutions. In this paper, we investigate harnessing this human computation for a Field Programmable Gate Array (FPGA) p...
Luke Terry, Vladimir Roitch, Shoeb Tufail, Kirit S...
IFIP12
2009
14 years 7 months ago
Mining Patterns of Lung Infections in Chest Radiographs
Chest radiography is a reference standard and the initial diagnostic test performed in patients who present with signs and symptoms suggesting a pulmonary infection. The most commo...
Spyros Tsevas, Dimitrios K. Iakovidis, George Papa...
74
Voted
CVPR
2011
IEEE
14 years 6 months ago
Generalized Projection Based M-Estimator: Theory and Applications
We introduce a robust estimator called generalized projection based M-estimator (gpbM) which does not require the user to specify any scale parameters. For multiple inlier structu...
Sushil Mittal, Saket Anand, Peter Meer
92
Voted
BCB
2010
138views Bioinformatics» more  BCB 2010»
14 years 4 months ago
Comparative analysis of biclustering algorithms
Biclustering is a very popular method to identify hidden co-regulation patterns among genes. There are numerous biclustering algorithms designed to undertake this challenging task...
Doruk Bozdag, Ashwin S. Kumar, Ümit V. &Ccedi...