Sciweavers

258 search results - page 44 / 52
» Summarizing Review Scores of
Sort
View
TCOS
2010
14 years 4 months ago
J-PAKE: Authenticated Key Exchange without PKI
Password Authenticated Key Exchange (PAKE) is one of the important topics in cryptography. It aims to address a practical security problem: how to establish secure communication be...
Feng Hao, Peter Ryan
BMCBI
2008
98views more  BMCBI 2008»
14 years 9 months ago
Empirical Bayes models for multiple probe type microarrays at the probe level
Background: When analyzing microarray data a primary objective is often to find differentially expressed genes. With empirical Bayes and penalized t-tests the sample variances are...
Magnus Åstrand, Petter Mostad, Mats Rudemo
KDD
2004
ACM
136views Data Mining» more  KDD 2004»
15 years 9 months ago
A cross-collection mixture model for comparative text mining
In this paper, we define and study a novel text mining problem, which we refer to as Comparative Text Mining (CTM). Given a set of comparable text collections, the task of compara...
ChengXiang Zhai, Atulya Velivelli, Bei Yu
TRECVID
2007
14 years 10 months ago
The Lowlands team at TRECVID 2007
Type Run Description MAP Official A UTen English ASR 0.0031 A UTt hs-t2-nm Top-2 concepts from t hs graph method with neighbor multiply 0.0137 A UTwiki-t2-nm Top-2 Wikipedia conc...
Robin Aly, Claudia Hauff, Willemijn Heeren, Djoerd...
VIS
2007
IEEE
60views Visualization» more  VIS 2007»
15 years 10 months ago
Navigating in a Shape Space of Registered Models
New product development involves people with different backgrounds. Designers, engineers, and consumers all have different design criteria, and these criteria interact. Early conce...
Randall C. Smith, Richard Pawlicki, István Kók...