Sciweavers

5511 search results - page 879 / 1103
» Security for Network Places
Sort
View
URBAN
2008
99views more  URBAN 2008»
15 years 4 months ago
A comparison of address point, parcel and street geocoding techniques
The widespread availability of powerful geocoding tools in commercial GIS software and the interest in spatial analysis at the individual level have made address geocoding a widel...
Paul A. Zandbergen
BMCBI
2010
97views more  BMCBI 2010»
14 years 11 months ago
A semi-parametric Bayesian model for unsupervised differential co-expression analysis
Background: Differential co-expression analysis is an emerging strategy for characterizing disease related dysregulation of gene expression regulatory networks. Given pre-defined ...
Johannes M. Freudenberg, Siva Sivaganesan, Michael...
JMLR
2012
13 years 6 months ago
Random Search for Hyper-Parameter Optimization
Grid search and manual search are the most widely used strategies for hyper-parameter optimization. This paper shows empirically and theoretically that randomly chosen trials are ...
James Bergstra, Yoshua Bengio
WWW
2008
ACM
16 years 5 months ago
Rogue access point detection using segmental TCP jitter
Rogue Access Points (RAPs) pose serious security threats to local networks. An analytic model of prior probability distribution of Segmental TCP Jitter (STJ) is deduced from the m...
Gaogang Xie, Tingting He, Guangxing Zhang
WWW
2005
ACM
16 years 5 months ago
Duplicate detection in click streams
We consider the problem of finding duplicates in data streams. Duplicate detection in data streams is utilized in various applications including fraud detection. We develop a solu...
Ahmed Metwally, Divyakant Agrawal, Amr El Abbadi