Sciweavers

3556 search results - page 635 / 712
» Can machine learning be secure
Sort
View
ITNG
2006
IEEE
14 years 4 months ago
Biomedical Term Disambiguation: An Application to Gene-Protein Name Disambiguation
The huge volumes of biomedical texts available online drives the increasing need for automated techniques to analyze and extract knowledge from these repositories of information. ...
Hisham Al-Mubaid, Ping Chen
SSDBM
2006
IEEE
121views Database» more  SSDBM 2006»
14 years 4 months ago
Time Series Analysis Using the Concept of Adaptable Threshold Similarity
The issue of data mining in time series databases is of utmost importance for many practical applications and has attracted a lot of research in the past years. In this paper, we ...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...
IUI
2006
ACM
14 years 4 months ago
Posture and activity silhouettes for self-reporting, interruption management, and attentive interfaces
In this paper we present a novel system for monitoring a computer user’s posture and activities in front of the computer (e.g., reading, speaking on the phone, etc.) for self-re...
Alejandro Jaimes
SIGCSE
2006
ACM
163views Education» more  SIGCSE 2006»
14 years 4 months ago
TextMOLE: text mining operations library and environment
The paper describes the first version of the TextMOLE (Text Mining Operations Library and Environment) system for textual data mining. Currently TextMOLE acts as an advanced inde...
Daniel B. Waegel, April Kontostathis
SIGIR
2006
ACM
14 years 4 months ago
LDA-based document models for ad-hoc retrieval
Search algorithms incorporating some form of topic model have a long history in information retrieval. For example, cluster-based retrieval has been studied since the 60s and has ...
Xing Wei, W. Bruce Croft