Sciweavers

517 search results - page 46 / 104
» Locating related regulations using a comparative analysis ap...
Sort
View
KDD
2008
ACM
128views Data Mining» more  KDD 2008»
14 years 8 months ago
Bypass rates: reducing query abandonment using negative inferences
We introduce a new approach to analyzing click logs by examining both the documents that are clicked and those that are bypassed--documents returned higher in the ordering of the ...
Atish Das Sarma, Sreenivas Gollapudi, Samuel Ieong
CORR
2007
Springer
105views Education» more  CORR 2007»
13 years 7 months ago
Design and Modeling of a Mems-Based Valveless Pump Driven by an Electromagnetic Force
A novel valveless micro impedance pump is proposed and analyzed in this study. The pump is constructed of a upper glass plate, two glass tubes, a PDMS (polydimethylsilxane) diaphr...
Hsien-Tsung Chang, Chia-Yen Lee, Chih-Yung Wen
IBPRIA
2007
Springer
14 years 1 months ago
False Positive Reduction in Breast Mass Detection Using Two-Dimensional PCA
In this paper we present a novel method for reducing false positives in breast mass detection. Our approach is based on using the Two-Dimensional Principal Component Analysis (2DPC...
Arnau Oliver, Xavier Lladó, Joan Mart&iacut...
MICCAI
2006
Springer
14 years 8 months ago
Fast and Accurate Connectivity Analysis Between Functional Regions Based on DT-MRI
Diffusion tensor and functional MRI data provide insight into function and structure of the human brain. However, connectivity analysis between functional areas is still a challeng...
Dorit Merhof, Mirco Richter, Frank Enders, Peter H...
DSN
2004
IEEE
13 years 11 months ago
Verifying Web Applications Using Bounded Model Checking
The authors describe the use of bounded model checking (BMC) for verifying Web application code. Vulnerable sections of code are patched automatically with runtime guards, allowin...
Yao-Wen Huang, Fang Yu, Christian Hang, Chung-Hung...