Sciweavers

1056 search results - page 14 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
NGC
2007
Springer
150views Communications» more  NGC 2007»
13 years 7 months ago
Exploiting Temporal Relations in Mining Hepatitis Data
Various data mining methods have been developed last few years for hepatitis study using a large temporal and relational database given to the research community. In this work we i...
Tu Bao Ho, Canh Hao Nguyen, Saori Kawasaki, Si Qua...
DAC
2005
ACM
14 years 8 months ago
Exploiting suspected redundancy without proving it
We present several improvements to general-purpose sequential redundancy removal. First, we propose using a robust variety of synergistic transformation and verification algorithm...
Hari Mony, Jason Baumgartner, Viresh Paruthi, Robe...
ECIR
2009
Springer
14 years 4 months ago
Exploiting Flickr Tags and Groups for Finding Landmark Photos
Many people take pictures of different city landmarks and post them to photo-sharing systems like Flickr. They also add tags and place photos in Flickr groups, created around parti...
Rabeeh Abbasi, Sergey Chernov, Wolfgang Nejdl, Ral...
HICSS
2010
IEEE
180views Biometrics» more  HICSS 2010»
14 years 2 months ago
Hiding in Plain Sight: Exploiting Broadcast for Practical Host Anonymity
Users are being tracked on the Internet more than ever before as Web sites and search engines gather pieces of information sufficient to identify and study their behavior. While m...
Craig A. Shue, Minaxi Gupta
BIOTECHNO
2008
IEEE
14 years 2 months ago
Exploiting Codon-Triplets Association for Genome Primary Structure Analysis
— The way evolution shapes the arrangement of synonymous codons within open reading frames (ORF) for fine tuning mRNA decoding efficiency is not yet understood. Since the ribosom...
José P. Lousado, Gabriela R. Moura, Manuel ...