Sciweavers

543 search results - page 81 / 109
» Methods for Empirical Game-Theoretic Analysis
Sort
View
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 8 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
CIKM
2009
Springer
14 years 2 months ago
Group CRM: a new telecom CRM framework from social network perspective
The structure of customer communication network provides us a natural way to understand customers’ relationships. Traditional customer relationship management (CRM) methods focu...
Bin Wu, Qi Ye, Shengqi Yang, Bai Wang
PTS
2007
120views Hardware» more  PTS 2007»
13 years 9 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
APBC
2004
116views Bioinformatics» more  APBC 2004»
13 years 9 months ago
Structure-Function Relationship in DNA Sequence Recognition by Transcription Factors
Transcription factors play essential role in the gene regulation in higher organisms, binding to multiple target sequences and regulating multiple genes in a complex manner. In or...
Akinori Sarai, Samuel Selvaraj, M. Michael Gromiha...
RECOMB
2002
Springer
14 years 8 months ago
DNA sequence evolution with neighbor-dependent mutation
We introduce a model of DNA sequence evolution which can account for biases in mutation rates that depend on the identity of the neighboring bases. An analytic solution for this c...
Peter F. Arndt, Christopher B. Burge, Terence Hwa