Sciweavers

680 search results - page 112 / 136
» Analyzing the Effectiveness and Applicability of Co-training
Sort
View
CIKM
2006
Springer
13 years 11 months ago
Representing documents with named entities for story link detection (SLD)
Several information organization, access, and filtering systems can benefit from different kind of document representations than those used in traditional Information Retrieval (I...
Chirag Shah, W. Bruce Croft, David Jensen
DSD
2009
IEEE
118views Hardware» more  DSD 2009»
13 years 10 months ago
On the Risk of Fault Coupling over the Chip Substrate
—Duplication and comparison has proven to be an efficient method for error detection. Based on this generic principle dual core processor architectures with output comparison ar...
Peter Tummeltshammer, Andreas Steininger
ATAL
2008
Springer
13 years 9 months ago
Resource limitations, transmission costs and critical thresholds in scale-free networks
Whether or not a critical threshold exists when epidemic diseases are spread in complex networks is a problem attracting attention from researchers in several disciplines. In 2001...
Chung-Yuan Huang, Chuen-Tsai Sun, Chia-Ying Cheng,...
CCS
2010
ACM
13 years 7 months ago
Detecting and characterizing social spam campaigns
Online social networks (OSNs) are popular collaboration and communication tools for millions of users and their friends. Unfortunately, in the wrong hands, they are also effective...
Hongyu Gao, Jun Hu, Christo Wilson, Zhichun Li, Ya...
BMCBI
2007
182views more  BMCBI 2007»
13 years 7 months ago
Additive risk survival model with microarray data
Background: Microarray techniques survey gene expressions on a global scale. Extensive biomedical studies have been designed to discover subsets of genes that are associated with ...
Shuangge Ma, Jian Huang