Sciweavers

1957 search results - page 262 / 392
» Summarization - Compressing Data into an Informative Represe...
Sort
View
SEC
2007
15 years 5 months ago
Ontological Mapping of Common Criteria's Security Assurance Requirements
The Common Criteria (CC) for Information Technology Security Evaluation provides comprehensive guidelines for the evaluation and certification of IT security regarding data securit...
Andreas Ekelhart, Stefan Fenz, Gernot Goluch, Edga...
CSDA
2006
67views more  CSDA 2006»
15 years 4 months ago
Sensitivity analysis of the strain criterion for multidimensional scaling
Multidimensional scaling (MDS) is a collection of data analytic techniques for constructing configurations of points from dissimilarity information about interpoint distances. Cla...
R. M. Lewis, M. W. Trosset
157
Voted
ML
2011
ACM
179views Machine Learning» more  ML 2011»
14 years 11 months ago
Neural networks for relational learning: an experimental comparison
In the last decade, connectionist models have been proposed that can process structured information directly. These methods, which are based on the use of graphs for the representa...
Werner Uwents, Gabriele Monfardini, Hendrik Blocke...
TCBB
2008
137views more  TCBB 2008»
15 years 3 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
GRC
2010
IEEE
15 years 5 months ago
Learning Multiple Latent Variables with Self-Organizing Maps
Inference of latent variables from complicated data is one important problem in data mining. The high dimensionality and high complexity of real world data often make accurate infe...
Lili Zhang, Erzsébet Merényi