Sciweavers

2006 search results - page 298 / 402
» Heuristic Security-Testing Methods
Sort
View
111
Voted
IJCAI
2007
15 years 3 months ago
Document Summarization Using Conditional Random Fields
Many methods, including supervised and unsupervised algorithms, have been developed for extractive document summarization. Most supervised methods consider the summarization task ...
Dou Shen, Jian-Tao Sun, Hua Li, Qiang Yang, Zheng ...
122
Voted
BMCBI
2007
130views more  BMCBI 2007»
15 years 2 months ago
A model-based optimization framework for the inference of regulatory interactions using time-course DNA microarray expression da
Background: Proteins are the primary regulatory agents of transcription even though mRNA expression data alone, from systems like DNA microarrays, are widely used. In addition, th...
Reuben Thomas, Carlos J. Paredes, Sanjay Mehrotra,...
153
Voted
ICWSM
2009
14 years 12 months ago
Content Based Recommendation and Summarization in the Blogosphere
This paper presents a stochastic graph based method for recommending or selecting a small subset of blogs that best represents a much larger set. within a certain topic. Each blog...
Ahmed Hassan, Dragomir R. Radev, Junghoo Cho, Amru...
203
Voted
ICDE
2008
IEEE
195views Database» more  ICDE 2008»
16 years 3 months ago
Scalable Rule-Based Gene Expression Data Classification
Abstract-- Current state-of-the-art association rule-based classifiers for gene expression data operate in two phases: (i) Association rule mining from training data followed by (i...
Mark A. Iwen, Willis Lang, Jignesh M. Patel
107
Voted
KDD
2003
ACM
142views Data Mining» more  KDD 2003»
16 years 2 months ago
Mining phenotypes and informative genes from gene expression data
Mining microarray gene expression data is an important research topic in bioinformatics with broad applications. While most of the previous studies focus on clustering either gene...
Chun Tang, Aidong Zhang, Jian Pei