Sciweavers

472 search results - page 42 / 95
» The guide RNA database
Sort
View
ICDE
2006
IEEE
108views Database» more  ICDE 2006»
14 years 11 months ago
On the Inverse Classification Problem and its Applications
In this paper, we discuss the inverse classification problem, in which we desire to define the features of an incomplete record in such a way that will result in a desired class l...
Charu C. Aggarwal, Chen Chen, Jiawei Han
ICPR
2004
IEEE
14 years 11 months ago
Exploring Human Eye Behaviour using a Model of Visual Attention
It is natural in a visual search to look at any object that is similar to the target so that it can be recognised and a decision made to end the search. Eye tracking technology of...
Fred Stentiford, Oyewole Oyekoya
SIGMOD
2008
ACM
158views Database» more  SIGMOD 2008»
14 years 10 months ago
How NOT to review a paper: the tools and techniques of the adversarial reviewer
There are several useful guides available for how to review a paper in Computer Science [10, 6, 12, 7, 2]. These are soberly presented, carefully reasoned and sensibly argued. As ...
Graham Cormode
SIGMOD
2002
ACM
116views Database» more  SIGMOD 2002»
14 years 10 months ago
Methodology for Development and Employment of Ontology Based Knowledge Management Applications
In this article we illustrate a methodology for introducing and maintaining ontology based knowledge management applications into enterprises with a focus on Knowledge Processes a...
York Sure, Steffen Staab, Rudi Studer
ICDT
2007
ACM
148views Database» more  ICDT 2007»
14 years 4 months ago
Ask a Better Question, Get a Better Answer A New Approach to Private Data Analysis
Cryptographic techniques for reasoning about information leakage have recently been brought to bear on the classical problem of statistical disclosure control – revealing accurat...
Cynthia Dwork