Sciweavers

2229 search results - page 369 / 446
» Comparative analysis of biclustering algorithms
Sort
View
CCS
2008
ACM
14 years 4 days ago
Revocation games in ephemeral networks
A frequently proposed solution to node misbehavior in mobile ad hoc networks is to use reputation systems. But in ephemeral networks - a new breed of mobile networks where contact...
Maxim Raya, Mohammad Hossein Manshaei, Márk...
CIKM
2008
Springer
14 years 4 days ago
Web-scale named entity recognition
Automatic recognition of named entities such as people, places, organizations, books, and movies across the entire web presents a number of challenges, both of scale and scope. Da...
Casey Whitelaw, Alexander Kehlenbeck, Nemanja Petr...
CIKM
2008
Springer
14 years 4 days ago
Book search: indexing the valuable parts
With massive book digitization efforts underway, there is a need for developing effective book retrieval strategies. This paper explores the relative contribution of different par...
Walid Magdy, Kareem Darwish
CIKM
2008
Springer
14 years 4 days ago
The role of syntactic features in protein interaction extraction
Most approaches for protein interaction mining from biomedical texts use both lexical and syntactic features. However, the individual impact of these two kinds of features on the ...
Timur Fayruzov, Martine De Cock, Chris Cornelis, V...
ACII
2005
Springer
14 years 3 days ago
A Novel Regularized Fisher Discriminant Method for Face Recognition Based on Subspace and Rank Lifting Scheme
The null space N(St) of total scatter matrix St contains no useful information for pattern classification. So, discarding the null space N(St) results in dimensionality reduction ...
Wen-Sheng Chen, Pong Chi Yuen, Jian Huang, Jian-Hu...