Sciweavers

3104 search results - page 550 / 621
» Using quantitative analysis to implement autonomic IT system...
Sort
View
151
Voted
KDD
2012
ACM
202views Data Mining» more  KDD 2012»
13 years 6 months ago
UFIMT: an uncertain frequent itemset mining toolbox
In recent years, mining frequent itemsets over uncertain data has attracted much attention in the data mining community. Unlike the corresponding problem in deterministic data, th...
Yongxin Tong, Lei Chen 0002, Philip S. Yu
240
Voted
POPL
2008
ACM
16 years 4 months ago
From dirt to shovels: fully automatic tool generation from ad hoc data
An ad hoc data source is any semistructured data source for which useful data analysis and transformation tools are not readily available. Such data must be queried, transformed a...
Kathleen Fisher, David Walker, Kenny Qili Zhu, Pet...
162
Voted
BMCBI
2010
143views more  BMCBI 2010»
15 years 3 months ago
ETE: a python Environment for Tree Exploration
Background: Many bioinformatics analyses, ranging from gene clustering to phylogenetics, produce hierarchical trees as their main result. These are used to represent the relations...
Jaime Huerta-Cepas, Joaquín Dopazo, Toni Ga...
160
Voted
ENTCS
2007
168views more  ENTCS 2007»
15 years 3 months ago
Bytecode Rewriting in Tom
In this paper, we present a term rewriting based library for manipulating Java bytecode. We define a mapping from bytecode programs to algebraic terms, and we use Tom, an extensi...
Emilie Balland, Pierre-Etienne Moreau, Antoine Rei...
138
Voted
FGR
2006
IEEE
156views Biometrics» more  FGR 2006»
15 years 9 months ago
A Realtime Shrug Detector
A realtime system for shrug detection is discussed in this paper. The system is automatically initialized by a face detector based on Ada-boost[14]. After frontal face is localize...
Huazhong Ning, Tony X. Han, Yuxiao Hu, ZhenQiu Zha...