Sciweavers

683 search results - page 116 / 137
» Unique Group Signatures
Sort
View
IMC
2010
ACM
14 years 9 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...
IJKDB
2010
141views more  IJKDB 2010»
14 years 9 months ago
Mining Frequent Boolean Expressions: Application to Gene Expression and Regulatory Modeling
Regulatory network analysis and other bioinformatics tasks require the ability to induce and represent arbitrary boolean expressions from data sources. We introduce a novel framew...
Mohammed Javeed Zaki, Naren Ramakrishnan, Lizhuang...
ICONFERENCE
2011
14 years 6 months ago
Design, discussion, and dissent in open bug reports
While studies have considered computer-mediated decision-making in several domains, few have considered the unique challenges posed in software design. To address this gap, a qual...
Andrew Jensen Ko, Parmit K. Chilana
JMLR
2011
105views more  JMLR 2011»
14 years 6 months ago
Posterior Sparsity in Unsupervised Dependency Parsing
A strong inductive bias is essential in unsupervised grammar induction. In this paper, we explore a particular sparsity bias in dependency grammars that encourages a small number ...
Jennifer Gillenwater, Kuzman Ganchev, João ...
JAMIA
2011
87views more  JAMIA 2011»
14 years 2 months ago
Can poison control data be used for pharmaceutical poisoning surveillance?
the title of a report to view the full citation and abstract. s of these reports are available now 169 unique articles this week Age: Adolescents A closer look at co-rumination: Ge...
Christopher A. Naun, Cody S. Olsen, J. Michael Dea...