Sciweavers

1039 search results - page 135 / 208
» The Def-inite Approach to Dependency Analysis
Sort
View
117
Voted
BMCBI
2005
140views more  BMCBI 2005»
15 years 1 months ago
Dissecting systems-wide data using mixture models: application to identify affected cellular processes
Background: Functional analysis of data from genome-scale experiments, such as microarrays, requires an extensive selection of differentially expressed genes. Under many condition...
J. Peter Svensson, Renée X. de Menezes, Ing...
JSS
2010
120views more  JSS 2010»
15 years 2 hour ago
An evaluation of timed scenario notations
There is a general consensus on the importance of good Requirements Engineering (RE) for achieving high quality software. The modeling and analysis of requirements have been the m...
Jameleddine Hassine, Juergen Rilling, Rachida Dsso...
ICSE
2008
IEEE-ACM
16 years 2 months ago
Scalable detection of semantic clones
Several techniques have been developed for identifying similar code fragments in programs. These similar fragments, referred to as code clones, can be used to identify redundant c...
Mark Gabel, Lingxiao Jiang, Zhendong Su
PKDD
1999
Springer
130views Data Mining» more  PKDD 1999»
15 years 5 months ago
OPTICS-OF: Identifying Local Outliers
: For many KDD applications finding the outliers, i.e. the rare events, is more interesting and useful than finding the common cases, e.g. detecting criminal activities in E-commer...
Markus M. Breunig, Hans-Peter Kriegel, Raymond T. ...
RIDE
1997
IEEE
15 years 5 months ago
Knowledge Discovery from Users Web-Page Navigation
We propose to detect users navigationpaths to the advantage of web-site owners. First, we explain the design and implementationof a profiler which captures client’s selected li...
Cyrus Shahabi, Amir M. Zarkesh, Jafar Adibi, Visha...