Sciweavers

1106 search results - page 210 / 222
» Software That Can Think and Do
Sort
View
BMCBI
2010
102views more  BMCBI 2010»
13 years 6 months ago
Identification of recurrent regions of copy-number variants across multiple individuals
Background: Algorithms and software for CNV detection have been developed, but they detect the CNV regions sample-by-sample with individual-specific breakpoints, while common CNV ...
Teo Shu Mei, Agus Salim, Stefano Calza, Ku Chee Se...
BMCBI
2005
145views more  BMCBI 2005»
13 years 6 months ago
CAGER: classification analysis of gene expression regulation using multiple information sources
Background: Many classification approaches have been applied to analyzing transcriptional regulation of gene expressions. These methods build models that can explain a gene's...
Jianhua Ruan, Weixiong Zhang
ACSAC
2010
IEEE
13 years 4 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
WSDM
2012
ACM
300views Data Mining» more  WSDM 2012»
12 years 2 months ago
Adding semantics to microblog posts
Microblogs have become an important source of information for the purpose of marketing, intelligence, and reputation management. Streams of microblogs are of great value because o...
Edgar Meij, Wouter Weerkamp, Maarten de Rijke
ICML
2008
IEEE
14 years 7 months ago
Modified MMI/MPE: a direct evaluation of the margin in speech recognition
In this paper we show how common speech recognition training criteria such as the Minimum Phone Error criterion or the Maximum Mutual Information criterion can be extended to inco...
Georg Heigold, Hermann Ney, Ralf Schlüter, Th...