Sciweavers

1050 search results - page 67 / 210
» Two methods of authenticated positioning
Sort
View
AAAI
2006
15 years 1 months ago
Embedding Heterogeneous Data Using Statistical Models
Embedding algorithms are a method for revealing low dimensional structure in complex data. Most embedding algorithms are designed to handle objects of a single type for which pair...
Amir Globerson, Gal Chechik, Fernando Pereira, Naf...
ISICT
2003
15 years 1 months ago
Spam filters: bayes vs. chi-squared; letters vs. words
We compare two statistical methods for identifying spam or junk electronic mail. Spam filters are classifiers which determine whether an email is junk or not. The proliferation ...
Cormac O'Brien, Carl Vogel
IJWGS
2008
83views more  IJWGS 2008»
14 years 12 months ago
Association-based dynamic computation of reputation in web services
: Web services are usually selected and composed based on their reputation. In general, the reputation of a web service is computed using the feedback provided by the user. However...
Pradeep K. Atrey, M. Anwar Hossain, Abdulmotaleb E...
WABI
2010
Springer
172views Bioinformatics» more  WABI 2010»
14 years 10 months ago
Fast Mapping and Precise Alignment of AB SOLiD Color Reads to Reference DNA
Abstract. Applied Biosystems’ SOLiD system offers a low-cost alternative to the traditional Sanger method of DNA sequencing. We introduce two main algorithms of mapping SOLiD’...
Miklós Csürös, Szilveszter Juhos,...
ICML
2006
IEEE
16 years 19 days ago
Learning user preferences for sets of objects
Most work on preference learning has focused on pairwise preferences or rankings over individual items. In this paper, we present a method for learning preferences over sets of it...
Marie desJardins, Eric Eaton, Kiri Wagstaff