Sciweavers

221 search results - page 25 / 45
» Data Hiding Techniques Using Prime and Natural Numbers
Sort
View
FLAIRS
2007
13 years 10 months ago
Improving Cluster Method Quality by Validity Indices
Clustering attempts to discover significant groups present in a data set. It is an unsupervised process. It is difficult to define when a clustering result is acceptable. Thus,...
Narjes Hachani, Habib Ounelli
BMCBI
2010
110views more  BMCBI 2010»
13 years 7 months ago
Missing value imputation for epistatic MAPs
Background: Epistatic miniarray profiling (E-MAPs) is a high-throughput approach capable of quantifying aggravating or alleviating genetic interactions between gene pairs. The dat...
Colm Ryan, Derek Greene, Gerard Cagney, Padraig Cu...
PAMI
2010
396views more  PAMI 2010»
13 years 6 months ago
Self-Validated Labeling of Markov Random Fields for Image Segmentation
—This paper addresses the problem of self-validated labeling of Markov random fields (MRFs), namely to optimize an MRF with unknown number of labels. We present graduated graph c...
Wei Feng, Jiaya Jia, Zhi-Qiang Liu
KDD
2007
ACM
160views Data Mining» more  KDD 2007»
14 years 8 months ago
Show me the money!: deriving the pricing power of product features by mining consumer reviews
The increasing pervasiveness of the Internet has dramatically changed the way that consumers shop for goods. Consumergenerated product reviews have become a valuable source of inf...
Nikolay Archak, Anindya Ghose, Panagiotis G. Ipeir...
CORR
2010
Springer
224views Education» more  CORR 2010»
13 years 7 months ago
A Cluster Based Replication Architecture for Load Balancing in Peer-to-Peer Content Distribution
In P2P systems, large volumes of data are declustered naturally across a large number of peers. But it is very difficult to control the initial data distribution because every use...
S. Ayyasamy, S. N. Sivanandam