Sciweavers

257 search results - page 43 / 52
» Packet-Based Input Test Data Compression Techniques
Sort
View
PAKDD
2010
ACM
146views Data Mining» more  PAKDD 2010»
14 years 3 days ago
Mining Antagonistic Communities from Social Networks
During social interactions in a community, there are often sub-communities that behave in opposite manner. These antagonistic sub-communities could represent groups of people with ...
Kuan Zhang, David Lo, Ee-Peng Lim
DSS
2000
102views more  DSS 2000»
13 years 7 months ago
Cost control and production performance enhancement by IT investment and regulation changes: evidence from the healthcare indust
By using panel data spanning a period of 18 years and by estimating a general cost function in a cost minimization Z .setting, we conducted an analysis of information technology I...
Nirup M. Menon, Byungtae Lee
HAIS
2011
Springer
12 years 10 months ago
Clustering Ensemble for Spam Filtering
One of the main problems that modern e-mail systems face is the management of the high degree of spam or junk mail they recieve. Those systems are expected to be able to distinguis...
Santiago Porras, Bruno Baruque, Belén Vaque...
JCNS
2000
86views more  JCNS 2000»
13 years 7 months ago
Computational Modeling of Orientation Tuning Dynamics in Monkey Primary Visual Cortex
In the primate visual pathway, orientation tuning of neurons is first observed in the primary visual cortex. The LGN cells that comprise the thalamic input to V1 are not orientati...
M. C. Pugh, Dario L. Ringach, Robert Shapley, M. J...
ICLP
2010
Springer
13 years 5 months ago
A Framework for Verification and Debugging of Resource Usage Properties: Resource Usage Verification
We present a framework for (static) verification of general resource usage program properties. The framework extends the criteria of correctness as the conformance of a program to ...
Pedro López-García, Luthfi Darmawan,...