Sciweavers

272 search results - page 52 / 55
» Linking Domain Models and Process Models for Reference Model...
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
14 years 29 days ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
NAR
2011
214views Computer Vision» more  NAR 2011»
12 years 12 months ago
DAnCER: Disease-Annotated Chromatin Epigenetics Resource
Chromatin modification (CM) is a set of epigenetic processes that govern many aspects of DNA replication, transcription and repair. CM is carried out by groups of physically inter...
Andrei L. Turinsky, Brian Turner, Rosanne C. Borja...
WWW
2011
ACM
13 years 4 months ago
Towards semantic knowledge propagation from text corpus to web images
In this paper, we study the problem of transfer learning from text to images in the context of network data in which link based bridges are available to transfer the knowledge bet...
Guojun Qi, Charu C. Aggarwal, Thomas Huang
JODI
2010
115views more  JODI 2010»
13 years 3 months ago
ICE-Theorem - End to end semantically aware eResearch infrastructure for theses
: ICE-TheOREM was a project which made several important contributions to the repository domain, promoting deposit by integrating the repository with authoring workflows and enhanc...
Peter Sefton, Jim Downing
ICDM
2005
IEEE
161views Data Mining» more  ICDM 2005»
14 years 2 months ago
Making Logistic Regression a Core Data Mining Tool with TR-IRLS
Binary classification is a core data mining task. For large datasets or real-time applications, desirable classifiers are accurate, fast, and need no parameter tuning. We presen...
Paul Komarek, Andrew W. Moore