Sciweavers

616 search results - page 103 / 124
» Bayesian network based sentence retrieval model
Sort
View
ISI
2006
Springer
13 years 7 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
MM
2009
ACM
233views Multimedia» more  MM 2009»
14 years 11 days ago
Enhancing semantic and geographic annotation of web images via logistic canonical correlation regression
Photo community sites such as Flickr and Picasa Web Album host a massive amount of personal photos with millions of new photos uploaded every month. These photos constitute an ove...
Liangliang Cao, Jie Yu, Jiebo Luo, Thomas S. Huang
IJCNN
2006
IEEE
14 years 1 months ago
Small-catchment flood forecasting and drainage network extraction using computational intelligence
— Forecast, detection and warning of severe weather and related hydro-geological risks is becoming one of the major issues for civil protection. The use of computational intellig...
Erika Coppola, Barbara Tomassetti, Marco Verdecchi...
BMCBI
2010
202views more  BMCBI 2010»
13 years 7 months ago
NeMo: Network Module identification in Cytoscape
Background: As the size of the known human interactome grows, biologists increasingly rely on computational tools to identify patterns that represent protein complexes and pathway...
Corban G. Rivera, Rachit Vakil, Joel S. Bader
RECSYS
2009
ACM
14 years 2 months ago
FeedbackTrust: using feedback effects in trust-based recommendation systems
With the advent of online social networks, the trust-based approach to recommendation has emerged which exploits the trust network among users and makes recommendations based on t...
Samaneh Moghaddam, Mohsen Jamali, Martin Ester, Ja...