Sciweavers

1512 search results - page 251 / 303
» Towards the Personalization of Algorithms Evaluation in Data...
Sort
View
CORR
2010
Springer
286views Education» more  CORR 2010»
14 years 6 months ago
PhishDef: URL Names Say It All
Phishing is an increasingly sophisticated method to steal personal user information using sites that pretend to be legitimate. In this paper, we take the following steps to identif...
Anh Le, Athina Markopoulou, Michalis Faloutsos
BMCBI
2007
145views more  BMCBI 2007»
14 years 9 months ago
Improved benchmarks for computational motif discovery
Background: An important step in annotation of sequenced genomes is the identification of transcription factor binding sites. More than a hundred different computational methods h...
Geir Kjetil Sandve, Osman Abul, Vegard Walseng, Fi...
ICWS
2010
IEEE
14 years 8 months ago
User Experience in Added Value Location-Based Mobile Music Service
— In this paper, the user experience in added value location-based mobile music service called the City Night Life (CNL) is evaluated and analyzed. The CNL service provides recom...
Timo Koskela, Sari Järvinen, Meirong Liu, Mik...
GIS
2009
ACM
15 years 11 months ago
Augmenting Cartographic Resources for Autonomous Driving
In this paper we present algorithms for automatically generating a road network description from aerial imagery. The road network inforamtion (RNI) produced by our algorithm inclu...
Young-Woo Seo, Chris Urmson, David Wettergreen Ji...
KDD
2006
ACM
174views Data Mining» more  KDD 2006»
15 years 10 months ago
Onboard classifiers for science event detection on a remote sensing spacecraft
Typically, data collected by a spacecraft is downlinked to Earth and pre-processed before any analysis is performed. We have developed classifiers that can be used onboard a space...
Ashley Davies, Benjamin Cichy, Dominic Mazzoni, Ng...