Sciweavers

352 search results - page 47 / 71
» The Power of Experience: On the Usefulness of Validation Kno...
Sort
View
BMCBI
2010
153views more  BMCBI 2010»
13 years 7 months ago
Automatic symptom name normalization in clinical records of traditional Chinese medicine
Background: In recent years, Data Mining technology has been applied more than ever before in the field of traditional Chinese medicine (TCM) to discover regularities from the exp...
Yaqiang Wang, Zhonghua Yu, Yongguang Jiang, Kaikuo...
BMCBI
2007
128views more  BMCBI 2007»
13 years 7 months ago
Detailed estimation of bioinformatics prediction reliability through the Fragmented Prediction Performance Plots
Background: An important and yet rather neglected question related to bioinformatics predictions is the estimation of the amount of data that is needed to allow reliable predictio...
Oliviero Carugo
SPIN
2009
Springer
14 years 1 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
ICTAI
2006
IEEE
14 years 1 months ago
A Junction Tree Propagation Algorithm for Bayesian Networks with Second-Order Uncertainties
Bayesian networks (BNs) have been widely used as a model for knowledge representation and probabilistic inferences. However, the single probability representation of conditional d...
Maurizio Borsotto, Weihong Zhang, Emir Kapanci, Av...
IWPC
2008
IEEE
14 years 1 months ago
Ensuring Well-Behaved Usage of APIs through Syntactic Constraints
Libraries are the most widespreaded form of software reuse. In order to properly use a library API, its clients should fulfill a series of (many times implicit) assumptions made ...
Martin Feilkas, Daniel Ratiu