Sciweavers

1316 search results - page 91 / 264
» A Computational Approach to Compare Information Revelation P...
Sort
View
FUIN
2011
358views Cryptology» more  FUIN 2011»
13 years 19 days ago
Unsupervised and Supervised Learning Approaches Together for Microarray Analysis
In this article, a novel concept is introduced by using both unsupervised and supervised learning. For unsupervised learning, the problem of fuzzy clustering in microarray data as ...
Indrajit Saha, Ujjwal Maulik, Sanghamitra Bandyopa...
BMCBI
2006
93views more  BMCBI 2006»
13 years 9 months ago
A summarization approach for Affymetrix GeneChip data using a reference training set from a large, biologically diverse database
Background: Many of the most popular pre-processing methods for Affymetrix expression arrays, such as RMA, gcRMA, and PLIER, simultaneously analyze data across a set of predetermi...
Simon Katz, Rafael A. Irizarry, Xue Lin, Mark Trip...
IROS
2007
IEEE
132views Robotics» more  IROS 2007»
14 years 3 months ago
Hysteretic q-learning : an algorithm for decentralized reinforcement learning in cooperative multi-agent teams
— Multi-agent systems (MAS) are a field of study of growing interest in a variety of domains such as robotics or distributed controls. The article focuses on decentralized reinf...
Laëtitia Matignon, Guillaume J. Laurent, Nadi...
ICECCS
2005
IEEE
236views Hardware» more  ICECCS 2005»
14 years 2 months ago
Detecting Malicious JavaScript Code in Mozilla
The JavaScript language is used to enhance the clientside display of web pages. JavaScript code is downloaded into browsers and executed on-the-fly by an embedded interpreter. Br...
Oystein Hallaraker, Giovanni Vigna
ECIS
2004
13 years 10 months ago
An ethnographic study of IS investment appraisal
Both academics and practitioners have invested considerably in the information systems evaluation arena, yet rewards remain elusive. The aim of this paper is to provide rich insig...
Debra Howcroft, Robert McDonald