Sciweavers

1054 search results - page 123 / 211
» group 2005
Sort
View
ADMA
2005
Springer
157views Data Mining» more  ADMA 2005»
15 years 6 months ago
Learning k-Nearest Neighbor Naive Bayes for Ranking
Accurate probability-based ranking of instances is crucial in many real-world data mining applications. KNN (k-nearest neighbor) [1] has been intensively studied as an effective c...
Liangxiao Jiang, Harry Zhang, Jiang Su
CRYPTO
2005
Springer
164views Cryptology» more  CRYPTO 2005»
15 years 6 months ago
Composition Does Not Imply Adaptive Security
We study the question whether the sequential or parallel composition of two functions, each indistinguishable from a random function by non-adaptive distinguishers is secure agains...
Krzysztof Pietrzak
111
Voted
EVOW
2005
Springer
15 years 6 months ago
Order Preserving Clustering over Multiple Time Course Experiments
Abstract. Clustering still represents the most commonly used technique to analyze gene expression data—be it classical clustering approaches that aim at finding biologically rel...
Stefan Bleuler, Eckart Zitzler
125
Voted
IPMI
2005
Springer
15 years 6 months ago
Transitive Inverse-Consistent Manifold Registration
Abstract. This paper presents a new registration method called Transitive InverseConsistent Manifold Registration (TICMR). The TICMR method jointly estimates correspondence maps be...
Xiujuan Geng, Dinesh Kumar, Gary E. Christensen
MHCI
2005
Springer
15 years 6 months ago
Three applications for mobile epidemic algorithms
This paper presents a framework for the pervasive sharing of data using wireless networks. ‘FarCry’ uses the mobility of users to carry files between separated networks. Throu...
Paul Tennent, Malcolm Hall, Barry Brown, Matthew C...