Sciweavers

861 search results - page 132 / 173
» Predicting Attack-prone Components
Sort
View
EKAW
2008
Springer
13 years 9 months ago
Unsupervised Discovery of Compound Entities for Relationship Extraction
In this paper we investigate unsupervised population of a biomedical ontology via information extraction from biomedical literature. Relationships in text seldom connect simple ent...
Cartic Ramakrishnan, Pablo N. Mendes, Shaojun Wang...
ERSA
2007
177views Hardware» more  ERSA 2007»
13 years 9 months ago
Energy-Aware System Synthesis for Reconfigurable Chip Multiprocessors
- Even though state-of-the-art FPGAs present new opportunities in exploring low-cost high-performance architectures for floating-point scientific applications, they also pose serio...
Xiaofang Wang, Sotirios G. Ziavras, Jie Hu
IADIS
2008
13 years 9 months ago
A Case-Based Reasoning System to Forecast the Presence Of Oil Slicks
After an oil spill it is essential to know if an area is going to be affected by the oil slicks generated. The system presented here forecasts the presence or not of oil slicks in...
Juan M. Corchado, Aitor Mata, Juan Francisco de Pa...
NIPS
2007
13 years 9 months ago
Automatic Generation of Social Tags for Music Recommendation
Social tags are user-generated keywords associated with some resource on the Web. In the case of music, social tags have become an important component of “Web2.0” recommender ...
Douglas Eck, Paul Lamere, Thierry Bertin-Mahieux, ...
UAI
2008
13 years 9 months ago
Convex Point Estimation using Undirected Bayesian Transfer Hierarchies
When related learning tasks are naturally arranged in a hierarchy, an appealing approach for coping with scarcity of instances is that of transfer learning using a hierarchical Ba...
Gal Elidan, Benjamin Packer, Geremy Heitz, Daphne ...