Sciweavers

3556 search results - page 639 / 712
» Can machine learning be secure
Sort
View
DMKD
2003
ACM
110views Data Mining» more  DMKD 2003»
14 years 3 months ago
Weave amino acid sequences for protein secondary structure prediction
Given a known protein sequence, predicting its secondary structure can help understand its three-dimensional (tertiary) structure, i.e., the folding. In this paper, we present an ...
Xiaochun Yang, Bin Wang
IUI
2003
ACM
14 years 3 months ago
An adaptive stock tracker for personalized trading advice
The Stock Tracker is an adaptive recommendation system for trading stocks that automatically acquires content-based models of user preferences to tailor its buy and sell advice. T...
Jungsoon P. Yoo, Melinda T. Gervasio, Pat Langley
ATAL
2003
Springer
14 years 3 months ago
How to calm hyperactive agents
System performance in multi-agent resource allocation systems can often improve if individual agents reduce their activity. Agents in such systems need a way to modulate their ind...
H. Van Dyke Parunak, Sven Brueckner, Robert S. Mat...
COLT
2003
Springer
14 years 3 months ago
On Finding Large Conjunctive Clusters
We propose a new formulation of the clustering problem that differs from previous work in several aspects. First, the goal is to explicitly output a collection of simple and meani...
Nina Mishra, Dana Ron, Ram Swaminathan
DEXA
2003
Springer
95views Database» more  DEXA 2003»
14 years 3 months ago
XML and Knowledge Technologies for Semantic-Based Indexing of Paper Documents
Effective daily processing of large amounts of paper documents in office environments requires the application of semantic-based indexing techniques during the transformation of pa...
Donato Malerba, Michelangelo Ceci, Margherita Bera...