Malicious mass-mailing activity on the Internet is a serious and continuing threat that includes mass-mailing worms, spam, and phishing. A mechanism commonly used to deliver such ...
David Whyte, Paul C. van Oorschot, Evangelos Krana...
— Computational prediction of transcription factor’s binding sites and regulatory target genes has great value to the biological studies of cellular process. Existing practices...
Abstract— This paper deals with the problem of blind multiuser detection in multirate direct-sequence code division multiple access (DS-CDMA). Direct-Sequence Spread Spectrum (DS...
We present an ensemble learning approach that achieves accurate predictions from arbitrarily partitioned data. The partitions come from the distributed processing requirements of ...
Larry Shoemaker, Robert E. Banfield, Lawrence O. H...
—Support Vector Machines are used to combine the outputs of multiple entity extractors, thus creating a composite entity extraction system. The composite system has a significant...
Deborah Duong, James Venuto, Ben Goertzel, Ryan Ri...