Sciweavers

1056 search results - page 109 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
ISBRA
2009
Springer
14 years 5 months ago
A Linear-Time Algorithm for Analyzing Array CGH Data Using Log Ratio Triangulation
Abstract. DNA copy number is the number of replicates of a contiguous segment of DNA on the genome. Copy number alteration (CNA) is a genetic abnormality in which the number of the...
Matthew Hayes, Jing Li
IAT
2009
IEEE
14 years 5 months ago
Social Trust-Aware Recommendation System: A T-Index Approach
Collaborative Filtering based on similarity suffers from a variety of problems such as sparsity and scalability. In this paper, we propose an ontological model of trust between us...
Alireza Zarghami, Soude Fazeli, Nima Dokoohaki, Mi...
ICASSP
2009
IEEE
14 years 5 months ago
Automatic musical meter detection
A method that automatically estimates the metrical structure of a piece of music is presented. The approach is based on the generation of a beat similarity matrix, which provides ...
Mikel Gainza
SP
2009
IEEE
123views Security Privacy» more  SP 2009»
14 years 4 months ago
DSybil: Optimal Sybil-Resistance for Recommendation Systems
Recommendation systems can be attacked in various ways, and the ultimate attack form is reached with a sybil attack, where the attacker creates a potentially unlimited number of s...
Haifeng Yu, Chenwei Shi, Michael Kaminsky, Phillip...
ICDM
2009
IEEE
168views Data Mining» more  ICDM 2009»
14 years 4 months ago
Bi-relational Network Analysis Using a Fast Random Walk with Restart
—Identification of nodes relevant to a given node in a relational network is a basic problem in network analysis with great practical importance. Most existing network analysis ...
Jing Xia, Doina Caragea, William H. Hsu