Sciweavers

13026 search results - page 2457 / 2606
» Probabilistic Relational Models
Sort
View
164
Voted
USS
2008
15 years 6 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
133
Voted
COCO
2010
Springer
149views Algorithms» more  COCO 2010»
15 years 5 months ago
Trade-Off Lower Bounds for Stack Machines
—A space bounded Stack Machine is a regular Turing Machine with a read-only input tape, several space bounded read-write work tapes, and an unbounded stack. Stack Machines with a...
Matei David, Periklis A. Papakonstantinou
124
Voted
BIRD
2008
Springer
141views Bioinformatics» more  BIRD 2008»
15 years 5 months ago
Nested q-Partial Graphs for Genetic Network Inference from "Small n, Large p" Microarray Data
Abstract. Gaussian graphical models are widely used to tackle the important and challenging problem of inferring genetic regulatory networks from expression data. These models have...
Kevin Kontos, Gianluca Bontempi
185
Voted
BIRTHDAY
2008
Springer
15 years 5 months ago
Why Sets?
Sets play a key role in foundations of mathematics. Why? To what extent is it an accident of history? Imagine that you have a chance to talk to mathematicians from a far-away plane...
Andreas Blass
147
Voted
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
15 years 5 months ago
Active learning for biomedical citation screening
Active learning (AL) is an increasingly popular strategy for mitigating the amount of labeled data required to train classifiers, thereby reducing annotator effort. We describe ...
Byron C. Wallace, Kevin Small, Carla E. Brodley, T...
« Prev « First page 2457 / 2606 Last » Next »