Sciweavers

1693 search results - page 129 / 339
» Pattern-Recognition: a Foundational Approach
Sort
View
SIGIR
2004
ACM
15 years 10 months ago
Document clustering via adaptive subspace iteration
Document clustering has long been an important problem in information retrieval. In this paper, we present a new clustering algorithm ASI1, which uses explicitly modeling of the s...
Tao Li, Sheng Ma, Mitsunori Ogihara
CIARP
2004
Springer
15 years 10 months ago
Unsupervised Learning of Ontology-Linked Selectional Preferences
We present a method for extracting selectional preferences of verbs from unannotated text. These selectional preferences are linked to an ontology (e.g. the hypernym relations foun...
Hiram Calvo, Alexander F. Gelbukh
GECCO
2004
Springer
169views Optimization» more  GECCO 2004»
15 years 10 months ago
Genetic Programming Neural Networks as a Bioinformatics Tool for Human Genetics
The identification of genes that influence the risk of common, complex diseases primarily through interactions with other genes and environmental factors remains a statistical and ...
Marylyn D. Ritchie, Christopher S. Coffey, Jason H...
IH
2004
Springer
15 years 10 months ago
Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures
A variety of remote sensing attacks allow adversaries to break flow confidentiality and gather mission-critical information in distributed systems. Such attacks are easily supple...
Xinwen Fu, Bryan Graham, Dong Xuan, Riccardo Betta...
SAC
2010
ACM
15 years 10 months ago
User-controlled generalization boundaries for p-sensitive k-anonymity
Numerous privacy models based on the k-anonymity property have been introduced in the last few years. While differing in their methods and quality of their results, they all focus...
Alina Campan, Traian Marius Truta, Nicholas Cooper