Sciweavers

286 search results - page 41 / 58
» Proximality and Chebyshev sets
Sort
View
ICDM
2005
IEEE
188views Data Mining» more  ICDM 2005»
14 years 3 months ago
Hierarchy-Regularized Latent Semantic Indexing
Organizing textual documents into a hierarchical taxonomy is a common practice in knowledge management. Beside textual features, the hierarchical structure of directories reflect...
Yi Huang, Kai Yu, Matthias Schubert, Shipeng Yu, V...
IDEAL
2004
Springer
14 years 3 months ago
PromSearch: A Hybrid Approach to Human Core-Promoter Prediction
This paper presents an effective core-promoter prediction system on human DNA sequence. The system, named PromSearch, employs a hybrid approach which combines search-by-content met...
Byoung-Hee Kim, Seong-Bae Park, Byoung-Tak Zhang
ISMIR
2004
Springer
119views Music» more  ISMIR 2004»
14 years 3 months ago
Creating a nested melodic representation: competition and cooperation among bottom-up and top-down Gestalt principles
A set of principles (based on Gestalt theory) governing how we group notes into meaningful groups has been widely accepted in the literature. Based on these principles, many diver...
Jane Singer
ATAL
2003
Springer
14 years 3 months ago
Towards a motivation-based approach for evaluating goals
Traditional goal-oriented approaches to building intelligent agents only consider absolute satisfaction of goals. However, in continuous domains there may be many instances in whi...
Stephen J. Munroe, Michael Luck, Mark d'Inverno
INFOCOM
2002
IEEE
14 years 2 months ago
Detecting SYN Flooding Attacks
Abstract—We propose a simple and robust mechanism for detecting SYN flooding attacks. Instead of monitoring the ongoing traffic at the front end (like firewall or proxy) or a ...
Haining Wang, Danlu Zhang, Kang G. Shin