Sciweavers

2084 search results - page 192 / 417
» Knowledge Exploitation from the Web
Sort
View
155
Voted
BMCBI
2010
143views more  BMCBI 2010»
15 years 3 months ago
Learning gene regulatory networks from only positive and unlabeled data
Background: Recently, supervised learning methods have been exploited to reconstruct gene regulatory networks from gene expression data. The reconstruction of a network is modeled...
Luigi Cerulo, Charles Elkan, Michele Ceccarelli
265
Voted
PAMI
2011
14 years 10 months ago
3D Face Reconstruction from a Single Image Using a Single Reference Face Shape
—Human faces are remarkably similar in global properties, including size, aspect ratio, and location of main features, but can vary considerably in details across individuals, ge...
Ira Kemelmacher-Shlizerman, Ronen Basri
WWW
2005
ACM
16 years 4 months ago
Executing incoherency bounded continuous queries at web data aggregators
Continuous queries are used to monitor changes to time varying data and to provide results useful for online decision making. Typically a user desires to obtain the value of some ...
Rajeev Gupta, Ashish Puri, Krithi Ramamritham
150
Voted
WWW
2007
ACM
16 years 4 months ago
Bridging the gap between OWL and relational databases
Schema statements in OWL are interpreted quite differently from analogous statements in relational databases. If these statements are meant to be interpreted as integrity constrai...
Boris Motik, Ian Horrocks, Ulrike Sattler
SEMWEB
2007
Springer
15 years 10 months ago
An Ontology Design Pattern for Representing Relevance in OWL
Abstract. Design patterns are widely-used software engineering abstractions which define guidelines for modeling common application scenarios. Ontology design patterns are the ext...
Fernando Bobillo, Miguel Delgado, Juan Góme...