Sciweavers

500 search results - page 46 / 100
» The Knowledge Depot: Building and Evaluating a Knowledge Man...
Sort
View
84
Voted
CCE
2006
15 years 17 days ago
Bayesian-based on-line applicability evaluation of neural network models in modeling automotive paint spray operations
The neural network (NN) models well trained and validated by the same data may exhibit noticeably different predictabilities in applications. This is mainly due to the fact that t...
Jia Li, Yinlun Huang
134
Voted
BMCBI
2007
151views more  BMCBI 2007»
15 years 15 days ago
A comparison study on algorithms of detecting long forms for short forms in biomedical text
Motivation: With more and more research dedicated to literature mining in the biomedical domain, more and more systems are available for people to choose from when building litera...
Manabu Torii, Zhang-Zhi Hu, Min Song, Cathy H. Wu,...
89
Voted
SAC
2010
ACM
15 years 7 months ago
Ontology-based generation of IT-security metrics
Legal regulations and industry standards require organizations to measure and maintain a specified IT-security level. Although several IT-security metrics approaches have been de...
Stefan Fenz
80
Voted
DAC
2009
ACM
16 years 1 months ago
Thermal-aware data flow analysis
This paper suggests that the thermal state of a processor can be approximated using data flow analysis. The results of this analysis can be used to evaluate the efficacy of therma...
David Atienza, José Luis Ayala, Philip Bris...
ACSAC
2010
IEEE
14 years 10 months ago
Fast and practical instruction-set randomization for commodity systems
Instruction-set randomization (ISR) is a technique based on randomizing the "language" understood by a system to protect it from code-injection attacks. Such attacks wer...
Georgios Portokalidis, Angelos D. Keromytis