Sciweavers

664 search results - page 110 / 133
» An objective way to evaluate and compare binarization algori...
Sort
View
SIGIR
2012
ACM
11 years 10 months ago
TwiNER: named entity recognition in targeted twitter stream
Many private and/or public organizations have been reported to create and monitor targeted Twitter streams to collect and understand users’ opinions about the organizations. Tar...
Chenliang Li, Jianshu Weng, Qi He, Yuxia Yao, Anwi...
TON
2010
210views more  TON 2010»
13 years 2 months ago
A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment
Abstract-- Security issues and attack management in transparent WDM (Wavelength Division Multiplexing) optical networks has become of prime importance to network operators due to t...
Nina Skorin-Kapov, J. Chen, Lena Wosinska
BMCBI
2004
196views more  BMCBI 2004»
13 years 7 months ago
MUSCLE: a multiple sequence alignment method with reduced time and space complexity
Background: In a previous paper, we introduced MUSCLE, a new program for creating multiple alignments of protein sequences, giving a brief summary of the algorithm and showing MUS...
Robert C. Edgar
KDD
2004
ACM
166views Data Mining» more  KDD 2004»
14 years 8 months ago
Predicting prostate cancer recurrence via maximizing the concordance index
In order to effectively use machine learning algorithms, e.g., neural networks, for the analysis of survival data, the correct treatment of censored data is crucial. The concordan...
Lian Yan, David Verbel, Olivier Saidi
CVPR
2003
IEEE
14 years 9 months ago
Methods and Geometry for Plane-Based Self-Calibration
Abstract. We consider the problem of camera selfcalibration, from images of a planar object with unknown Euclidean structure. The general case of possibly varying focal length is a...
Pierre Gurdjos, Peter Sturm