Sciweavers

610 search results - page 57 / 122
» A Knowledge Base for the maintenance of knowledge extracted ...
Sort
View
INCDM
2010
Springer
208views Data Mining» more  INCDM 2010»
13 years 9 months ago
Combining Unsupervised and Supervised Data Mining Techniques for Conducting Customer Portfolio Analysis
Abstract. Leveraging the power of increasing amounts of data to analyze customer base for attracting and retaining the most valuable customers is a major problem facing companies i...
Zhiyuan Yao, Annika H. Holmbom, Tomas Eklund, Barb...
JUCS
2008
180views more  JUCS 2008»
13 years 7 months ago
The APS Framework For Incremental Learning of Software Agents
Abstract: Adaptive behavior and learning are required of software agents in many application domains. At the same time agents are often supposed to be resource-bounded systems, whi...
Damian Dudek
CMS
2003
148views Communications» more  CMS 2003»
13 years 9 months ago
Computation of Cryptographic Keys from Face Biometrics
We outline cryptographic key–computation from biometric data based on error-tolerant transformation of continuous-valued face eigenprojections to zero-error bitstrings suitable f...
Alwyn Goh, David Ngo Chek Ling
BMCBI
2010
110views more  BMCBI 2010»
13 years 8 months ago
TimeDelay-ARACNE: Reverse engineering of gene networks from time-course data by an information theoretic approach
Background: One of main aims of Molecular Biology is the gain of knowledge about how molecular components interact each other and to understand gene function regulations. Using mi...
Pietro Zoppoli, Sandro Morganella, Michele Ceccare...
IAT
2003
IEEE
14 years 1 months ago
Person Name Identification in Chinese Documents Using Finite State Automata
This research is about automatic identification and extraction of person names in Chinese text documents. Solutions to this problem have immediate and extensive applications in ma...
Bing Shen, Zhongfei (Mark) Zhang, Chunfa Yuan