Sciweavers

988 search results - page 183 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
KDD
2009
ACM
205views Data Mining» more  KDD 2009»
14 years 3 months ago
From active towards InterActive learning: using consideration information to improve labeling correctness
Data mining techniques have become central to many applications. Most of those applications rely on so called supervised learning algorithms, which learn from given examples in th...
Abraham Bernstein, Jiwen Li
LICS
2008
IEEE
14 years 3 months ago
Reachability Games and Game Semantics: Comparing Nondeterministic Programs
We investigate the notions of may- and mustapproximation in Erratic Idealized Algol (a nondeterministic extension of Idealized Algol), and give explicit characterizations of both ...
Andrzej S. Murawski
BIBM
2007
IEEE
137views Bioinformatics» more  BIBM 2007»
14 years 3 months ago
A Multi-metric Similarity Based Analysis of Microarray Data
Clustering has been shown to be effective in analyzing functional relationships of genes. However, no single clustering method with single distance metric is capable of capturing ...
Fatih Altiparmak, Selnur Erdal, Ozgur Ozturk, Haka...
IMC
2004
ACM
14 years 2 months ago
Constraint-based geolocation of internet hosts
— Geolocation of Internet hosts enables a diverse and interesting new class of location-aware applications. Previous measurement-based approaches use reference hosts, called land...
Bamba Gueye, Artur Ziviani, Mark Crovella, Serge F...
SI3D
1999
ACM
14 years 1 months ago
Localized-hierarchy surface splines (LeSS)
An explicit spline representation of smooth free-form surfaces is combined with a hierarchy of meshes to form the basis of an interactive sculpting environment. The environment of...
Carlos Gonzalez-Ochoa, Jörg Peters