Sciweavers

76 search results - page 7 / 16
» Empirical evaluation of hash functions for multipoint measur...
Sort
View
MLMI
2007
Springer
14 years 1 months ago
Towards an Objective Test for Meeting Browsers: The BET4TQB Pilot Experiment
This paper outlines first the BET method for task-based evaluation of meeting browsers. ‘Observations of interest’ in meetings are empirically determined by neutral observers ...
Andrei Popescu-Belis, Philippe Baudrion, Mike Flyn...
JCC
2011
154views more  JCC 2011»
12 years 10 months ago
Can we trust docking results? Evaluation of seven commonly used programs on PDBbind database
: Docking is one of the most commonly used techniques in drug design. It is used for both identifying correct poses of a ligand in the binding site of a protein as well as for the ...
Dariusz Plewczynski, Michal Lazniewski, Rafal Augu...
DRM
2007
Springer
14 years 1 months ago
Slicing obfuscations: design, correctness, and evaluation
The goal of obfuscation is to transform a program, without affecting its functionality, such that some secret information within the program can be hidden for as long as possible...
Anirban Majumdar, Stephen Drape, Clark D. Thombors...
ICML
2005
IEEE
14 years 8 months ago
Supervised clustering with support vector machines
Supervised clustering is the problem of training a clustering algorithm to produce desirable clusterings: given sets of items and complete clusterings over these sets, we learn ho...
Thomas Finley, Thorsten Joachims
BIBE
2007
IEEE
134views Bioinformatics» more  BIBE 2007»
14 years 1 months ago
Bottom-Up Multiple Row Addition Algorithms for the Biclustering-Problem
Abstract—The discovery of locally and significantly correlated subpatterns within a two-dimensional dataset has recently become quite popular and is amongst others addressed by ...
Hyung-Won Koh, Lars Hildebrand