Sciweavers

1152 search results - page 229 / 231
» Modeling Functional Data Sources as Relations
Sort
View
JOCN
2010
86views more  JOCN 2010»
13 years 5 months ago
Neural Basis of Repetition Priming during Mathematical Cognition: Repetition Suppression or Repetition Enhancement?
■ We investigated the neural basis of repetition priming (RP) during mathematical cognition. Previous studies of RP have focused on repetition suppression as the basis of behavi...
Valorie N. Salimpoor, Catie Chang, Vinod Menon
CIKM
2009
Springer
14 years 2 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...
TIT
1998
99views more  TIT 1998»
13 years 7 months ago
Information-Theoretic Image Formation
—The emergent role of information theory in image formation is surveyed. Unlike the subject of information-theoretic communication theory, information-theoretic imaging is far fr...
Joseph A. O'Sullivan, Richard E. Blahut, Donald L....
NAR
2010
143views more  NAR 2010»
13 years 2 months ago
WormBase: a comprehensive resource for nematode research
WormBase (http://www.wormbase.org) is a central data repository for nematode biology. Initially created as a service to the Caenorhabditis elegans research field, WormBase has evo...
Todd W. Harris, Igor Antoshechkin, Tamberlyn Bieri...
ACSAC
2008
IEEE
14 years 1 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...