Sciweavers

1625 search results - page 235 / 325
» Learning to Find Pre-Images
Sort
View
AISS
2010
171views more  AISS 2010»
13 years 4 months ago
An Investigation into Influence Factor of Student Programming Grade Using Association Rule Mining
Computer programming is one of the most essential skills which each graduate has to acquire. However, there are reports that they are unable to write a program well. Researches in...
Mohamad Farhan Mohamad Mohsin, Mohd Helmy Abd Waha...
BMCBI
2011
13 years 4 months ago
A comparison and user-based evaluation of models of textual information structure in the context of cancer risk assessment
Background: Many practical tasks in biomedicine require accessing specific types of information in scientific literature; e.g. information about the results or conclusions of the ...
Yufan Guo, Anna Korhonen, Maria Liakata, Ilona Sil...
WWW
2011
ACM
13 years 4 months ago
Semi-supervised truth discovery
Accessing online information from various data sources has become a necessary part of our everyday life. Unfortunately such information is not always trustworthy, as different sou...
Xiaoxin Yin, Wenzhao Tan
JMLR
2010
179views more  JMLR 2010»
13 years 4 months ago
PAC-Bayesian Analysis of Co-clustering and Beyond
We derive PAC-Bayesian generalization bounds for supervised and unsupervised learning models based on clustering, such as co-clustering, matrix tri-factorization, graphical models...
Yevgeny Seldin, Naftali Tishby
JSAC
2010
188views more  JSAC 2010»
13 years 4 months ago
Random-walk based approach to detect clone attacks in wireless sensor networks
Abstract--Wireless sensor networks (WSNs) deployed in hostile environments are vulnerable to clone attacks. In such attack, an adversary compromises a few nodes, replicates them, a...
Yingpei Zeng, Jiannong Cao, Shigeng Zhang, Shanqin...