Sciweavers

7066 search results - page 120 / 1414
» Contact Relations with Applications
Sort
View
KDD
2005
ACM
103views Data Mining» more  KDD 2005»
14 years 9 months ago
Fast discovery of unexpected patterns in data, relative to a Bayesian network
We consider a model in which background knowledge on a given domain of interest is available in terms of a Bayesian network, in addition to a large database. The mining problem is...
Szymon Jaroszewicz, Tobias Scheffer
CSMR
2009
IEEE
14 years 3 months ago
Static Security Analysis Based on Input-Related Software Faults
It is important to focus on security aspects during the development cycle to deliver reliable software. However, locating security faults in complex systems is difficult and ther...
Csaba Nagy, Spiros Mancoridis
ICC
2009
IEEE
165views Communications» more  ICC 2009»
14 years 3 months ago
Arbitrarily Tight Upper and Lower Bounds on the Gaussian Q-Function and Related Functions
—We present a new family of tight lower and upper bounds on the Gaussian Q-function Q(x). It is first shown that, for any x, the integrand ϕ(θ; x) of the Craig representation ...
Giuseppe Thadeu Freitas de Abreu
ITNG
2007
IEEE
14 years 3 months ago
SEQUENCE PACKAGE ANALYSIS: A New Natural Language Understanding Method for Intelligent Mining of Recordings of Doctor-Patient In
Medical histories provide a rich resource for diagnoses and treatment. Similarly, consumers’ blog postings on health-related topics offer unique data for medical researchers, pr...
Amy Neustein
ICECCS
2006
IEEE
90views Hardware» more  ICECCS 2006»
14 years 3 months ago
A Type System for the Relational Calculus of Object Systems
Being a successful technique in software practice, Object Orientation (OO) is a hot topic in academic research fields. Among many formalisms, rCOS, a refinement calculus of obje...
Liang Zhao, Xiangpeng Zhao, Quan Long, Zongyan Qiu