Sciweavers

1004 search results - page 180 / 201
» A comparison of generalized linear discriminant analysis alg...
Sort
View
ACSAC
2007
IEEE
14 years 18 days ago
Efficient Detection of Delay-Constrained Relay Nodes
Relay nodes are a potential threat to networks since they are used in many malicious situations like stepping stone attacks, botnet communication, peer-to-peer streaming etc. Quic...
Baris Coskun, Nasir D. Memon
WWW
2007
ACM
14 years 9 months ago
Determining the user intent of web search engine queries
Determining the user intent of Web searches is a difficult problem due to the sparse data available concerning the searcher. In this paper, we examine a method to determine the us...
Bernard J. Jansen, Danielle L. Booth, Amanda Spink
CPM
2006
Springer
112views Combinatorics» more  CPM 2006»
14 years 10 days ago
Local Alignment of RNA Sequences with Arbitrary Scoring Schemes
Abstract. Local similarity is an important tool in comparative analysis of biological sequences, and is therefore well studied. In particular, the Smith-Waterman technique and its ...
Rolf Backofen, Danny Hermelin, Gad M. Landau, Oren...
KDD
2006
ACM
145views Data Mining» more  KDD 2006»
14 years 9 months ago
Deriving quantitative models for correlation clusters
Correlation clustering aims at grouping the data set into correlation clusters such that the objects in the same cluster exhibit a certain density and are all associated to a comm...
Arthur Zimek, Christian Böhm, Elke Achtert, H...
CIVR
2007
Springer
14 years 2 months ago
Semantics reinforcement and fusion learning for multimedia streams
Fusion of multimedia streams for enhanced performance is a critical problem for retrieval. However, fusion performance tends to easily overfit the hillclimb set used to learn fus...
Dhiraj Joshi, Milind R. Naphade, Apostol Natsev