Sciweavers

3556 search results - page 634 / 712
» Can machine learning be secure
Sort
View
ECTEL
2007
Springer
14 years 4 months ago
Star Rating for Social Care Services: Simulation Scenario in the PROLIX Framework
According to the Commission for Social Care Inspection, performance in Care Homes can be evaluated through a range of indicators in each of the different outcome areas specified by...
Lucia Pannese, Marcello Allegri, Maria Carlesi, Ga...
EDUTAINMENT
2007
Springer
14 years 4 months ago
Interactive Composition of 3D Faces for Virtual Characters
As many 3D on-line games appear, there is an increased need for simple and efficient techniques to create many new faces. This paper presents a new algorithm to composite 3D faces ...
Haeyoung Lee, Sungyeol Lee
ISBRA
2007
Springer
14 years 4 months ago
Discovering Relations Among GO-Annotated Clusters by Graph Kernel Methods
The biological interpretation of large-scale gene expression data is one of the challenges in current bioinformatics. The state-of-theart approach is to perform clustering and then...
Italo Zoppis, Daniele Merico, Marco Antoniotti, Bu...
PKDD
2007
Springer
76views Data Mining» more  PKDD 2007»
14 years 4 months ago
Finding Transport Proteins in a General Protein Database
The number of specialized databases in molecular biology is growing fast, as is the availability of molecular data. These trends necessitate the development of automatic methods fo...
Sanmay Das, Milton H. Saier Jr., Charles Elkan
ICSM
2006
IEEE
14 years 4 months ago
Using the Case-Based Ranking Methodology for Test Case Prioritization
The test case execution order affects the time at which the objectives of testing are met. If the objective is fault detection, an inappropriate execution order might reveal most ...
Paolo Tonella, Paolo Avesani, Angelo Susi