Sciweavers

648 search results - page 85 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
ICALP
2000
Springer
15 years 6 months ago
Scalable Secure Storage when Half the System Is Faulty
In this paper, we provide a method to safely store a document in perhaps the most challenging settings, a highly decentralized replicated storage system where up to half of the st...
Noga Alon, Haim Kaplan, Michael Krivelevich, Dahli...
BMCBI
2010
96views more  BMCBI 2010»
15 years 2 months ago
ModuleOrganizer: detecting modules in families of transposable elements
Background: Most known eukaryotic genomes contain mobile copied elements called transposable elements. In some species, these elements account for the majority of the genome seque...
Sébastien Tempel, Christine Rousseau, Fariz...
WWW
2008
ACM
16 years 3 months ago
Substructure similarity measurement in chinese recipes
Improving the precision of information retrieval has been a challenging issue on Chinese Web. As exemplified by Chinese recipes on the Web, it is not easy/natural for people to us...
Liping Wang, Qing Li, Na Li, Guozhu Dong, Yu Yang
IROS
2007
IEEE
193views Robotics» more  IROS 2007»
15 years 8 months ago
Data acquisition and view planning for 3-D modeling tasks
— In this paper we address the joint problems of automated data acquisition and view planning for large–scale indoor and outdoor sites. Our method proceeds in two distinct stag...
Paul Blaer, Peter K. Allen
CSL
2006
Springer
15 years 2 months ago
A study in machine learning from imbalanced data for sentence boundary detection in speech
Enriching speech recognition output with sentence boundaries improves its human readability and enables further processing by downstream language processing modules. We have const...
Yang Liu, Nitesh V. Chawla, Mary P. Harper, Elizab...