Sciweavers

1056 search results - page 94 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CCS
2007
ACM
15 years 9 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CIKM
2006
Springer
15 years 7 months ago
Coupling feature selection and machine learning methods for navigational query identification
It is important yet hard to identify navigational queries in Web search due to a lack of sufficient information in Web queries, which are typically very short. In this paper we st...
Yumao Lu, Fuchun Peng, Xin Li, Nawaaz Ahmed
I3
2007
15 years 4 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
BMCBI
2010
131views more  BMCBI 2010»
15 years 3 months ago
FACT: Functional annotation transfer between proteins with similar feature architectures
Background: The increasing number of sequenced genomes provides the basis for exploring the genetic and functional diversity within the tree of life. Only a tiny fraction of the e...
Tina Koestler, Arndt von Haeseler, Ingo Ebersberge...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
16 years 3 months ago
Multi-focal learning and its application to customer service support
In this study, we formalize a multi-focal learning problem, where training data are partitioned into several different focal groups and the prediction model will be learned within...
Yong Ge, Hui Xiong, Wenjun Zhou, Ramendra K. Sahoo...