Sciweavers

1400 search results - page 260 / 280
» Post-Analysis of Learned Rules
Sort
View
104
Voted
APWEB
2003
Springer
15 years 5 months ago
Mining "Hidden Phrase" Definitions from the Web
Keyword searching is the most common form of document search on the Web. Many Web publishers manually annotate the META tags and titles of their pages with frequently queried phras...
Hung V. Nguyen, P. Velamuru, Deepak Kolippakkam, H...
ICPR
2000
IEEE
15 years 5 months ago
Controlling On-Line Adaptation of a Prototype-Based Classifier for Handwritten Characters
Methods for controlling the adaptation process of an on-line handwritten character recognizer are studied. The classifier is based on the -nearest neighbor rule and it is adapted...
Vuokko Vuori, Jorma Laaksonen, Erkki Oja, Jari Kan...
AAAI
2007
15 years 4 months ago
A Randomized String Kernel and Its Application to RNA Interference
String kernels directly model sequence similarities without the necessity of extracting numerical features in a vector space. Since they better capture complex traits in the seque...
Shibin Qiu, Terran Lane, Ljubomir J. Buturovic
FLAIRS
2007
15 years 4 months ago
Mining Sequences in Distributed Sensors Data for Energy Production
The desire to predict power generation at a given point in time is essential to power scheduling, energy trading, and availability modeling. The research conducted within is conce...
Mehmed M. Kantardzic, John Gant
COMPSAC
2008
IEEE
15 years 3 months ago
Fabrication of Ontology for Security in Health Care Systems
Given the widespread intimidation state of affairs, there is a gripping want to enlarge architectures, algorithms, and protocols to apprehend a trustworthy network infrastructure....
J. Indumathi, G. V. Uma