Sciweavers

15351 search results - page 400 / 3071
» The information bottleneck method
Sort
View
149
Voted
CHI
2008
ACM
15 years 4 months ago
Secrets and lies in computer-mediated interaction: theory, methods and design
The keeping of secrets and practicing of deception are commonplace in everyday social interaction. They also serve an important role in encouraging social cohesion. However, for H...
Adam N. Joinson, Jeffrey T. Hancock, Pamela Briggs
124
Voted
PRL
2008
142views more  PRL 2008»
15 years 3 months ago
Highly accurate error-driven method for noun phrase detection
We present a new model for detection of noun phrases in unrestricted text, whose most outstanding feature is its flexibility: the system is able to recognize noun phrases similar ...
Lourdes Araujo, Jose Ignacio Serrano
121
Voted
IJHPCA
2007
88views more  IJHPCA 2007»
15 years 3 months ago
A Portable Method for Finding User Errors in the Usage of MPI Collective Operations
An MPI profiling library is a standard mechanism for intercepting MPI calls by applications. Profiling libraries are so named because they are commonly used to gather runtime in...
Christopher Falzone, Anthony Chan, Ewing L. Lusk, ...
109
Voted
IJSN
2007
73views more  IJSN 2007»
15 years 3 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
140
Voted
BMCBI
2005
118views more  BMCBI 2005»
15 years 3 months ago
Feature selection and classification for microarray data analysis: Evolutionary methods for identifying predictive genes
Background: In the clinical context, samples assayed by microarray are often classified by cell line or tumour type and it is of interest to discover a set of genes that can be us...
Thanyaluk Jirapech-Umpai, J. Stuart Aitken