Sciweavers

2084 search results - page 370 / 417
» Knowledge Exploitation from the Web
Sort
View
BMCBI
2010
186views more  BMCBI 2010»
13 years 9 months ago
Knowledge-based biomedical word sense disambiguation: comparison of approaches
Background: Word sense disambiguation (WSD) algorithms attempt to select the proper sense of ambiguous terms in text. Resources like the UMLS provide a reference thesaurus to be u...
Antonio Jimeno Yepes, Alan R. Aronson
CORR
2010
Springer
248views Education» more  CORR 2010»
13 years 9 months ago
Optimal Spectrum Sharing in MIMO Cognitive Radio Networks via Semidefinite Programming
Abstract--In cognitive radio (CR) networks with multipleinput multiple-output (MIMO) links, secondary users (SUs) can exploit "spectrum holes" in the space domain to acce...
Ying Jun Zhang, Anthony Man-Cho So
CE
2007
176views more  CE 2007»
13 years 9 months ago
Pedagogical approaches for technology-integrated science teaching
The two separate projects described have examined how teachers exploit computer-based technologies in supporting learning of science at secondary level. This paper examines how pe...
Sara Hennessy, Jocelyn Wishart, Denise Whitelock, ...
CORR
2010
Springer
171views Education» more  CORR 2010»
13 years 4 months ago
Online Learning in Opportunistic Spectrum Access: A Restless Bandit Approach
We consider an opportunistic spectrum access (OSA) problem where the time-varying condition of each channel (e.g., as a result of random fading or certain primary users' activ...
Cem Tekin, Mingyan Liu
BMCBI
2008
122views more  BMCBI 2008»
13 years 9 months ago
Reconstructing networks of pathways via significance analysis of their intersections
Background: Significance analysis at single gene level may suffer from the limited number of samples and experimental noise that can severely limit the power of the chosen statist...
Mirko Francesconi, Daniel Remondini, Nicola Nerett...