Sciweavers

2144 search results - page 325 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
SIGMETRICS
2008
ACM
111views Hardware» more  SIGMETRICS 2008»
15 years 4 months ago
Predicting the resource consumption of network intrusion detection systems
Abstract. When installing network intrusion detection systems (NIDSs), operators are faced with a large number of parameters and analysis options for tuning trade-offs between dete...
Holger Dreger, Anja Feldmann, Vern Paxson, Robin S...
TITB
2008
109views more  TITB 2008»
15 years 4 months ago
Automatic Segmentation of High-Throughput RNAi Fluorescent Cellular Images
High throughput genome-wide RNAi screening is emerging as an essential tool to assist biologists in understanding complex cellular processes. The large number of images produced in...
Pingkun Yan, Xiaobo Zhou, Mubarak Shah, Stephen T....
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 5 months ago
Seven pitfalls to avoid when running controlled experiments on the web
Controlled experiments, also called randomized experiments and A/B tests, have had a profound influence on multiple fields, including medicine, agriculture, manufacturing, and adv...
Thomas Crook, Brian Frasca, Ron Kohavi, Roger Long...
ERLANG
2008
ACM
15 years 6 months ago
Gradual typing of erlang programs: a wrangler experience
Currently most Erlang programs contain no or very little type information. This sometimes makes them unreliable, hard to use, and difficult to understand and maintain. In this pap...
Konstantinos F. Sagonas, Daniel Luna
ICDAR
2009
IEEE
15 years 11 months ago
2D CAD Data Mining Based on Spatial Relation
In this research, we propose CAD data mining technique to obtain semantic elements without prior knowledge about plans being designed. Our method consists of two steps. The first ...
Hiroaki Kizu, Junko Yamamoto, Takeshi Takeda, Keij...