Sciweavers

1056 search results - page 94 / 212
» Identifying and Exploiting Ultrametricity
Sort
View
CCS
2007
ACM
14 years 4 months ago
Multi-module vulnerability analysis of web-based applications
In recent years, web applications have become tremendously popular, and nowadays they are routinely used in security-critical environments, such as medical, financial, and milita...
Davide Balzarotti, Marco Cova, Viktoria Felmetsger...
CIKM
2006
Springer
14 years 1 months ago
Coupling feature selection and machine learning methods for navigational query identification
It is important yet hard to identify navigational queries in Web search due to a lack of sufficient information in Web queries, which are typically very short. In this paper we st...
Yumao Lu, Fuchun Peng, Xin Li, Nawaaz Ahmed
I3
2007
13 years 11 months ago
Identity: How to name it, How to find it
The main objective of this work is to exploit the relationship between the information findability problem and a subject-based organization of information. Identification of a sub...
Christo Dichev, Darina Dicheva, Jan Fischer
BMCBI
2010
131views more  BMCBI 2010»
13 years 10 months ago
FACT: Functional annotation transfer between proteins with similar feature architectures
Background: The increasing number of sequenced genomes provides the basis for exploring the genetic and functional diversity within the tree of life. Only a tiny fraction of the e...
Tina Koestler, Arndt von Haeseler, Ingo Ebersberge...
KDD
2009
ACM
156views Data Mining» more  KDD 2009»
14 years 10 months ago
Multi-focal learning and its application to customer service support
In this study, we formalize a multi-focal learning problem, where training data are partitioned into several different focal groups and the prediction model will be learned within...
Yong Ge, Hui Xiong, Wenjun Zhou, Ramendra K. Sahoo...