Sciweavers

1050 search results - page 173 / 210
» Two methods of authenticated positioning
Sort
View
KDD
2007
ACM
178views Data Mining» more  KDD 2007»
16 years 2 months ago
Practical learning from one-sided feedback
In many data mining applications, online labeling feedback is only available for examples which were predicted to belong to the positive class. Such applications include spam filt...
D. Sculley
KDD
2005
ACM
127views Data Mining» more  KDD 2005»
16 years 2 months ago
Detection of emerging space-time clusters
We propose a new class of spatio-temporal cluster detection methods designed for the rapid detection of emerging space-time clusters. We focus on the motivating application of pro...
Daniel B. Neill, Andrew W. Moore, Maheshkumar Sabh...
MM
2009
ACM
221views Multimedia» more  MM 2009»
15 years 8 months ago
Using large-scale web data to facilitate textual query based retrieval of consumer photos
The rapid popularization of digital cameras and mobile phone cameras has lead to an explosive growth of consumer photo collections. In this paper, we present a (quasi) real-time t...
Yiming Liu, Dong Xu, Ivor W. Tsang, Jiebo Luo
BMCBI
2008
98views more  BMCBI 2008»
15 years 1 months ago
Empirical Bayes models for multiple probe type microarrays at the probe level
Background: When analyzing microarray data a primary objective is often to find differentially expressed genes. With empirical Bayes and penalized t-tests the sample variances are...
Magnus Åstrand, Petter Mostad, Mats Rudemo
BMCBI
2007
160views more  BMCBI 2007»
15 years 1 months ago
Convergent algorithms for protein structural alignment
Background: Many algorithms exist for protein structural alignment, based on internal protein coordinates or on explicit superposition of the structures. These methods are usually...
Leandro Martínez, Roberto Andreani, Jos&eac...