Sciweavers

2540 search results - page 481 / 508
» Retrieval Status Values in Information Retrieval Evaluation
Sort
View
IUI
2000
ACM
13 years 11 months ago
Learning users' interests by unobtrusively observing their normal behavior
For intelligent interfaces attempting to learn a user’s interests, the cost of obtaining labeled training instances is prohibitive because the user must directly label each trai...
Jeremy Goecks, Jude W. Shavlik
EJC
2003
13 years 8 months ago
A Theory of Signs for Database Semantics
The goal of this paper is to build a bridge from a certain intuitive conception of natural language communication, called the SLIM theory of language, to a technical approach, cal...
Roland Hausser
INTEGRATION
2007
107views more  INTEGRATION 2007»
13 years 7 months ago
Power and electromagnetic analysis: Improved model, consequences and comparisons
Since their publication in 1998 and 2001 respectively, Power and Electromagnetic Analysis (SPA, DPA, EMA) have been successfully used to retrieve secret information stored in cryp...
Eric Peeters, François-Xavier Standaert, Je...
BMCBI
2004
123views more  BMCBI 2004»
13 years 7 months ago
galaxieEST: addressing EST identity through automated phylogenetic analysis
Background: Research involving expressed sequence tags (ESTs) is intricately coupled to the existence of large, well-annotated sequence repositories. Comparatively complete and sa...
R. Henrik Nilsson, Balaji Rajashekar, Karl-Henrik ...
ICSE
2008
IEEE-ACM
14 years 8 months ago
Precise memory leak detection for java software using container profiling
A memory leak in a Java program occurs when object references that are no longer needed are unnecessarily maintained. Such leaks are difficult to understand because static analyse...
Guoqing Xu, Atanas Rountev