Sciweavers

471 search results - page 88 / 95
» Social applications: exploring a more secure framework
Sort
View
KDD
2010
ACM
235views Data Mining» more  KDD 2010»
13 years 11 months ago
New perspectives and methods in link prediction
This paper examines important factors for link prediction in networks and provides a general, high-performance framework for the prediction task. Link prediction in sparse network...
Ryan Lichtenwalter, Jake T. Lussier, Nitesh V. Cha...
TCBB
2010
136views more  TCBB 2010»
13 years 6 months ago
Integrating Data Clustering and Visualization for the Analysis of 3D Gene Expression Data
— The recent development of methods for extracting precise measurements of spatial gene expression patterns from three-dimensional (3D) image data opens the way for new analyses ...
Oliver Rübel, Gunther H. Weber, Min-Yu Huang,...
ECBS
2000
IEEE
87views Hardware» more  ECBS 2000»
14 years 4 days ago
Limited Software Warranties
Because there are di erent types of software (e.g., language, application, target environment, etc.), di erent software certi cation methodologies are needed. Software process imp...
Jeffrey M. Voas
CSL
2010
Springer
13 years 8 months ago
Embedding Deduction Modulo into a Prover
Deduction modulo consists in presenting a theory through rewrite rules to support automatic and interactive proof search. It induces proof search methods based on narrowing, such a...
Guillaume Burel
ISCI
2008
108views more  ISCI 2008»
13 years 7 months ago
Modeling and manipulating the structure of hierarchical schemas for the web
The Semantic Web is the next step of the current Web where information will become more machine-understandable to support effective data discovery and integration. Hierarchical sc...
Theodore Dalamagas, Alexandra Meliou, Timos K. Sel...