Sciweavers

2337 search results - page 154 / 468
» Is the Open Way a Better Way
Sort
View
SECURWARE
2008
IEEE
14 years 4 months ago
Security Patterns for Capturing Encryption-Based Access Control to Sensor Data
—A security pattern describes a particular recurring security problem that arises in specific contexts, and presents a well-proven generic solution for it [1]. This paper descri...
Ángel Cuevas, Paul El Khoury, Laurent Gomez...
BIBE
2007
IEEE
176views Bioinformatics» more  BIBE 2007»
14 years 4 months ago
HICCUP: Hierarchical Clustering Based Value Imputation using Heterogeneous Gene Expression Microarray Datasets
Abstract—A novel microarray value imputation method, HICCUP1 , is presented. HICCUP improves upon existing value imputation methods in the several ways. (1) By judiciously integr...
Qiankun Zhao, Prasenjit Mitra, Dongwon Lee, Jaewoo...
DASFAA
2007
IEEE
139views Database» more  DASFAA 2007»
14 years 4 months ago
Self-tuning in Graph-Based Reference Disambiguation
Nowadays many data mining/analysis applications use the graph analysis techniques for decision making. Many of these techniques are based on the importance of relationships among t...
Rabia Nuray-Turan, Dmitri V. Kalashnikov, Sharad M...
ICDE
2007
IEEE
90views Database» more  ICDE 2007»
14 years 4 months ago
Music Recommendation Mapping and Interface Based on Structural Network Entropy
Recommendation systems generally produce the results of their output to their users in the form of an ordinal list. In the interest of simplicity, these lists are often obscure, ,...
Justin Donaldson
IMSCCS
2007
IEEE
14 years 4 months ago
Linear Correlation Analysis of Numeric Attributes for Government Data
To analyze the linear correlations of numeric attributes of government data, this paper proposes a method based on the clustering algorithm. A clustering method is adopted to prun...
Ying Chen, Guochang Gu, Tian-yang Lv, Shaobin Huan...