Sciweavers

3441 search results - page 337 / 689
» Provenance of Software Development Processes
Sort
View
SDM
2007
SIAM
204views Data Mining» more  SDM 2007»
15 years 6 months ago
Flexible Anonymization For Privacy Preserving Data Publishing: A Systematic Search Based Approach
k-anonymity is a popular measure of privacy for data publishing: It measures the risk of identity-disclosure of individuals whose personal information are released in the form of ...
Bijit Hore, Ravi Chandra Jammalamadaka, Sharad Meh...
BIOSTEC
2008
137views Healthcare» more  BIOSTEC 2008»
15 years 5 months ago
Breast Contour Detection with Stable Paths
Abstract. Breast cancer conservative treatment (BCCT), due to its proven oncological safety, is considered, when feasible, the gold standard of breast cancer treatment. However, ae...
Jaime S. Cardoso, Ricardo Sousa, Luís Filip...
BMCBI
2005
142views more  BMCBI 2005»
15 years 4 months ago
CLU: A new algorithm for EST clustering
Background: The continuous flow of EST data remains one of the richest sources for discoveries in modern biology. The first step in EST data mining is usually associated with EST ...
Andrey A. Ptitsyn, Winston Hide
TVLSI
2002
100views more  TVLSI 2002»
15 years 4 months ago
Architectural strategies for low-power VLSI turbo decoders
Abstract--The use of "turbo codes" has been proposed for several applications, including the development of wireless systems, where highly reliable transmission is requir...
Guido Masera, M. Mazza, Gianluca Piccinini, F. Vig...
NPL
2010
135views more  NPL 2010»
15 years 3 months ago
A Novel Regularization Learning for Single-View Patterns: Multi-View Discriminative Regularization
The existing Multi-View Learning (MVL) is to discuss how to learn from patterns with multiple information sources and has been proven its superior generalization to the usual Sing...
Zhe Wang, Songcan Chen, Hui Xue, Zhisong Pan