Sciweavers

581 search results - page 15 / 117
» In case you missed it
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 10 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
IEEEPACT
2008
IEEE
14 years 4 months ago
Characterizing and modeling the behavior of context switch misses
One of the essential features in modern computer systems is context switching, which allows multiple threads of execution to time-share a limited number of processors. While very ...
Fang Liu, Fei Guo, Yan Solihin, Seongbeom Kim, Abd...
SPW
2000
Springer
14 years 1 months ago
The Resurrecting Duckling - What Next?
In the context of the security of wireless ad hoc networks, we previously explored the problem of secure transient association between a master and a slave device in the absence of...
Frank Stajano
DAM
2007
131views more  DAM 2007»
13 years 9 months ago
Haplotyping with missing data via perfect path phylogenies
Computational methods for inferring haplotype information from genotype data are used in studying the association between genomic variation and medical condition. Recently, Gusfi...
Jens Gramm, Till Nierhoff, Roded Sharan, Till Tant...
ASWC
2009
Springer
13 years 7 months ago
Repairing the Missing is-a Structure of Ontologies
Abstract. Developing ontologies is not an easy task and often the resulting ontologies are not consistent or complete. Such ontologies, although often useful, also lead to problems...
Patrick Lambrix, Qiang Liu 0002, He Tan