Sciweavers

1096 search results - page 144 / 220
» Using Prior Knowledge: Problems and Solutions
Sort
View
147
Voted
ISDA
2008
IEEE
15 years 9 months ago
Combining Clustering and Bayesian Network for Gene Network Inference
Gene network reconstruction is a multidisciplinary research area involving data mining, machine learning, statistics, ontologies and others. Reconstructed gene network allows us t...
Suhaila Zainudin, Safaai Deris
AAAI
2011
14 years 3 months ago
Recommendation Sets and Choice Queries: There Is No Exploration/Exploitation Tradeoff!
Utility elicitation is an important component of many applications, such as decision support systems and recommender systems. Such systems query users about their preferences and ...
Paolo Viappiani, Craig Boutilier
127
Voted
IWANN
2001
Springer
15 years 8 months ago
Evolving RBF Neural Networks
This paper is focused on determining the parameters of radial basis function neural networks (number of neurons, and their respective centers and radii) automatically. While this ...
Víctor Manuel Rivas Santos, Pedro A. Castil...
151
Voted
CORR
2010
Springer
171views Education» more  CORR 2010»
15 years 3 months ago
Reliable Mining of Automatically Generated Test Cases from Software Requirements Specification (SRS)
Writing requirements is a two-way process. In this paper we use to classify Functional Requirements (FR) and Non Functional Requirements (NFR) statements from Software Requirement...
Lilly Raamesh, G. V. Uma
119
Voted
SP
2010
IEEE
158views Security Privacy» more  SP 2010»
15 years 7 months ago
Tamper Evident Microprocessors
Abstract—Most security mechanisms proposed to date unquestioningly place trust in microprocessor hardware. This trust, however, is misplaced and dangerous because microprocessors...
Adam Waksman, Simha Sethumadhavan