Sciweavers

248 search results - page 21 / 50
» Perturbation based Large Margin Approach for Ranking
Sort
View
WISE
2005
Springer
14 years 1 months ago
Document Re-ranking by Generality in Bio-medical Information Retrieval
Document ranking is well known to be a crucial process in information retrieval (IR). It presents retrieved documents in an order of their estimated degrees of relevance to query. ...
Xin Yan, Xue Li, Dawei Song
CIKM
2007
Springer
14 years 1 months ago
Top-k subgraph matching query in a large graph
Recently, due to its wide applications, subgraph search has attracted a lot of attention from database and data mining community. Sub-graph search is defined as follows: given a ...
Lei Zou, Lei Chen 0002, Yansheng Lu
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
13 years 11 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
BMCBI
2008
122views more  BMCBI 2008»
13 years 7 months ago
Generating samples for association studies based on HapMap data
Background: With the completion of the HapMap project, a variety of computational algorithms and tools have been proposed for haplotype inference, tag SNP selection and genome-wid...
Jing Li, Yixuan Chen
ATAL
2009
Springer
14 years 2 months ago
Sensitivity analysis for distributed optimization with resource constraints
Previous work in multiagent coordination has addressed the challenge of planning in domains where agents must optimize a global goal, while satisfying local resource constraints. ...
Emma Bowring, Zhengyu Yin, Rob Zinkov, Milind Tamb...