Sciweavers

13043 search results - page 2476 / 2609
» Simulation of the research process
Sort
View
DFN
2003
13 years 11 months ago
High-Efficient Intrusion Detection Infrastructure
In recent years research activities in computer network security focus more actively on the development of effective methods in intrusion detection. The reason for this developmen...
Thomas Holz, Michael Meier, Hartmut König
FLAIRS
2003
13 years 11 months ago
Topic Extraction and Extension to Support Concept Mapping
Successful knowledge management may depend not only on knowledge capture, but on knowledge construction—on formulating new and useful knowledge that was not previously available...
David B. Leake, Ana Gabriela Maguitman, Thomas Rei...
SDM
2004
SIAM
187views Data Mining» more  SDM 2004»
13 years 11 months ago
Minimum Sum-Squared Residue Co-Clustering of Gene Expression Data
Microarray experiments have been extensively used for simultaneously measuring DNA expression levels of thousands of genes in genome research. A key step in the analysis of gene e...
Hyuk Cho, Inderjit S. Dhillon, Yuqiang Guan, Suvri...
IJCAI
2003
13 years 11 months ago
Bayesian Information Extraction Network
Dynamic Bayesian networks (DBNs) offer an elegant way to integrate various aspects of language in one model. Many existing algorithms developed for learning and inference in DBNs ...
Leonid Peshkin, Avi Pfeffer
SPIESR
2004
143views Database» more  SPIESR 2004»
13 years 11 months ago
An entropy-based objective evaluation method for image segmentation
Accurate image segmentation is important for many image, video and computer vision applications. Over the last few decades, many image segmentation methods have been proposed. How...
Hui Zhang, Jason E. Fritts, Sally A. Goldman
« Prev « First page 2476 / 2609 Last » Next »