Sciweavers

2144 search results - page 344 / 429
» Understanding Document Analysis and Understanding (through M...
Sort
View
ANOR
2010
135views more  ANOR 2010»
15 years 4 months ago
A framework of irregularity enlightenment for data pre-processing in data mining
Abstract Irregularities are widespread in large databases and often lead to erroneous conclusions with respect to data mining and statistical analysis. For example, considerable bi...
Siu-Tong Au, Rong Duan, Siamak G. Hesar, Wei Jiang
BMCBI
2008
123views more  BMCBI 2008»
15 years 4 months ago
Pol II promoter prediction using characteristic 4-mer motifs: a machine learning approach
Background: Eukaryotic promoter prediction using computational analysis techniques is one of the most difficult jobs in computational genomics that is essential for constructing a...
Firoz Anwar, Syed Murtuza Baker, Taskeed Jabid, Md...
TKDE
2008
154views more  TKDE 2008»
15 years 4 months ago
Analyzing the Structure and Evolution of Massive Telecom Graphs
Abstract-- With ever growing competition in telecommunications markets, operators have to increasingly rely on business intelligence to offer the right incentives to their customer...
Amit Anil Nanavati, Rahul Singh, Dipanjan Chakrabo...
FAC
2000
114views more  FAC 2000»
15 years 4 months ago
Representational Reasoning and Verification
Formal approaches to the design of interactive systems rely on reasoning about properties of the t a very high level of abstraction. Specifications to support such an approach typi...
Gavin J. Doherty, José Creissac Campos, Mic...
WCRE
2010
IEEE
15 years 2 months ago
Studying the Impact of Clones on Software Defects
—There are numerous studies that examine whether or not cloned code is harmful to software systems. Yet, few of them study which characteristics of cloned code in particular lead...
Gehan M. K. Selim, Liliane Barbour, Weiyi Shang, B...