Sciweavers

609 search results - page 76 / 122
» Comparing Similarity Combination Methods for Schema Matching
Sort
View
PAKDD
2007
ACM
143views Data Mining» more  PAKDD 2007»
14 years 2 months ago
Clustering Ensembles Based on Normalized Edges
The co-association (CA) matrix was previously introduced to combine multiple partitions. In this paper, we analyze the CA matrix, and address its difference from the similarity ma...
Yan Li, Jian Yu, Pengwei Hao, Zhulin Li
IPPS
2006
IEEE
14 years 2 months ago
Predicting failures of computer systems: a case study for a telecommunication system
The goal of online failure prediction is to forecast imminent failures while the system is running. This paper compares Similar Events Prediction (SEP) with two other well-known t...
Felix Salfner, M. Schieschke, Miroslaw Malek
BMCBI
2010
129views more  BMCBI 2010»
13 years 8 months ago
Detection of distant evolutionary relationships between protein families using theory of sequence profile-profile comparison
Background: Detection of common evolutionary origin (homology) is a primary means of inferring protein structure and function. At present, comparison of protein families represent...
Mindaugas Margelevicius, Ceslovas Venclovas
SIGMOD
2009
ACM
269views Database» more  SIGMOD 2009»
14 years 9 months ago
Efficient approximate entity extraction with edit distance constraints
Named entity recognition aims at extracting named entities from unstructured text. A recent trend of named entity recognition is finding approximate matches in the text with respe...
Wei Wang 0011, Chuan Xiao, Xuemin Lin, Chengqi Zha...
ACSAC
2003
IEEE
14 years 2 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...