Sciweavers

1016 search results - page 180 / 204
» The Focus Problem in Mobile Learning
Sort
View
ICDM
2009
IEEE
98views Data Mining» more  ICDM 2009»
14 years 4 months ago
Topic Distributions over Links on Web
—It is well known that Web users create links with different intentions. However, a key question, which is not well studied, is how to categorize the links and how to quantify th...
Jie Tang, Jing Zhang, Jeffrey Xu Yu, Zi Yang, Keke...
SAT
2009
Springer
132views Hardware» more  SAT 2009»
14 years 4 months ago
Relaxed DPLL Search for MaxSAT
We propose a new incomplete algorithm for the Maximum Satisfiability (MaxSAT) problem on unweighted Boolean formulas, focused specifically on instances for which proving unsatis...
Lukas Kroc, Ashish Sabharwal, Bart Selman
BIBM
2008
IEEE
172views Bioinformatics» more  BIBM 2008»
14 years 4 months ago
Boosting Methods for Protein Fold Recognition: An Empirical Comparison
Protein fold recognition is the prediction of protein’s tertiary structure (Fold) given the protein’s sequence without relying on sequence similarity. Using machine learning t...
Yazhene Krishnaraj, Chandan K. Reddy
ADMA
2008
Springer
186views Data Mining» more  ADMA 2008»
14 years 4 months ago
A Distributed Privacy-Preserving Association Rules Mining Scheme Using Frequent-Pattern Tree
Association rules mining is a frequently used technique which finds interesting association and correlation relationships among large set of data items which occur frequently toge...
Chunhua Su, Kouichi Sakurai
GECCO
2004
Springer
121views Optimization» more  GECCO 2004»
14 years 3 months ago
Vulnerability Analysis of Immunity-Based Intrusion Detection Systems Using Evolutionary Hackers
Artificial Immune Systems (AISs) are biologically inspired problem solvers that have been used successfully as intrusion detection systems (IDSs). This paper describes how the des...
Gerry V. Dozier, Douglas Brown, John Hurley, Kryst...