Sciweavers

400 search results - page 65 / 80
» Sentiment Analysis and the Use of Extrinsic Datasets in Eval...
Sort
View
ACSAC
2004
IEEE
15 years 3 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
CIKM
2008
Springer
15 years 1 months ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...
TITB
2008
199views more  TITB 2008»
14 years 11 months ago
A 3-D Active Shape Model Driven by Fuzzy Inference: Application to Cardiac CT and MR
Abstract--Manual quantitative analysis of cardiac left ventricular function using Multislice CT and MR is arduous because of the large data volume. In this paper, we present a 3-D ...
Hans C. van Assen, Mikhail G. Danilouchkine, M. S....
PVLDB
2010
107views more  PVLDB 2010»
14 years 10 months ago
On Multi-Column Foreign Key Discovery
A foreign/primary key relationship between relational tables is one of the most important constraints in a database. From a data analysis perspective, discovering foreign keys is ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
BMCBI
2010
277views more  BMCBI 2010»
14 years 11 months ago
PCA2GO: a new multivariate statistics based method to identify highly expressed GO-Terms
Background: Several tools have been developed to explore and search Gene Ontology (GO) databases allowing efficient GO enrichment analysis and GO tree visualization. Nevertheless,...
Marc Bruckskotten, Mario Looso, Franz Cemic, Anne ...