Sciweavers

173 search results - page 23 / 35
» Predicting the severity of a reported bug
Sort
View
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
14 years 8 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
ICDM
2006
IEEE
148views Data Mining» more  ICDM 2006»
14 years 2 months ago
Data Mining Approaches to Criminal Career Analysis
— Narrative reports and criminal records are stored digitally across individual police departments, enabling the collection of this data to compile a nation-wide database of crim...
Jeroen S. de Bruin, Tim K. Cocx, Walter A. Kosters...
USS
2008
13 years 10 months ago
Lest We Remember: Cold Boot Attacks on Encryption Keys
Contrary to popular assumption, DRAMs used in most modern computers retain their contents for several seconds after power is lost, even at room temperature and even if removed fro...
J. Alex Halderman, Seth D. Schoen, Nadia Heninger,...
AAI
2006
110views more  AAI 2006»
13 years 8 months ago
Evaluation of Classifiers for an Uneven Class Distribution Problem
Classification problems with uneven class distributions present several difficulties during the training as well as during the evaluation process of classifiers. A classification ...
Sophia Daskalaki, Ioannis Kopanas, Nikolaos M. Avo...
BMCBI
2010
175views more  BMCBI 2010»
13 years 8 months ago
Calibur: a tool for clustering large numbers of protein decoys
Background: Ab initio protein structure prediction methods generate numerous structural candidates, which are referred to as decoys. The decoy with the most number of neighbors of...
Shuai Cheng Li, Yen Kaow Ng