Sciweavers

2950 search results - page 433 / 590
» Computing with Infinitely Many Processes
Sort
View
131
Voted
ISORC
2009
IEEE
15 years 9 months ago
Property Preservation and Composition with Guarantees: From ASSERT to CHESS
While the demand for high-integrity applications continues to rise, industrial developers seek cost effective development strategies that are capable of delivering the required gu...
Tullio Vardanega
ACML
2009
Springer
15 years 9 months ago
Conditional Density Estimation with Class Probability Estimators
Many regression schemes deliver a point estimate only, but often it is useful or even essential to quantify the uncertainty inherent in a prediction. If a conditional density estim...
Eibe Frank, Remco R. Bouckaert
115
Voted
AIIA
2009
Springer
15 years 9 months ago
Ontology-Driven Co-clustering of Gene Expression Data
Abstract. The huge volume of gene expression data produced by microarrays and other high-throughput techniques has encouraged the development of new computational techniques to eva...
Francesca Cordero, Ruggero G. Pensa, Alessia Visco...
147
Voted
WEBI
2009
Springer
15 years 9 months ago
Data Mining for Malicious Code Detection and Security Applications
: Data mining is the process of posing queries and extracting patterns, often previously unknown from large quantities of data using pattern matching or other reasoning techniques....
Bhavani M. Thuraisingham
161
Voted
LOCA
2009
Springer
15 years 9 months ago
Location Diversity: Enhanced Privacy Protection in Location Based Services
Abstract. Location-based Services are emerging as popular applications in pervasive computing. Spatial k-anonymity is used in Locationbased Services to protect privacy, by hiding t...
Mingqiang Xue, Panos Kalnis, Hung Keng Pung