Sciweavers

1008 search results - page 72 / 202
» Using predictive analysis to improve invoice-to-cash collect...
Sort
View
BMCBI
2008
90views more  BMCBI 2008»
13 years 9 months ago
Ortholog-based protein-protein interaction prediction and its application to inter-species interactions
Background: The rapid growth of protein-protein interaction (PPI) data has led to the emergence of PPI network analysis. Despite advances in high-throughput techniques, the intera...
Sheng-An Lee, Chen-hsiung Chan, Chi-Hung Tsai, Jin...
ACMSE
2009
ACM
14 years 3 months ago
Applying randomized projection to aid prediction algorithms in detecting high-dimensional rogue applications
This paper describes a research effort to improve the use of the cosine similarity information retrieval technique to detect unknown, known or variances of known rogue software by...
Travis Atkison
ICDAR
2009
IEEE
14 years 3 months ago
Enhanced Text Extraction from Arabic Degraded Document Images Using EM Algorithm
This paper presents a new enhanced text extraction algorithm from degraded document images on the basis of the probabilistic models. The observed document image is considered as a...
Wafa Boussellaa, Aymen Bougacha, Abderrazak Zahour...
APBC
2003
128views Bioinformatics» more  APBC 2003»
13 years 10 months ago
Machine Learning in DNA Microarray Analysis for Cancer Classification
The development of microarray technology has supplied a large volume of data to many fields. In particular, it has been applied to prediction and diagnosis of cancer, so that it e...
Sung-Bae Cho, Hong-Hee Won
INFSOF
2002
78views more  INFSOF 2002»
13 years 8 months ago
Flow insensitive points-to sets
Pointer analysis is an important part of source code analysis. Many programs that manipulate source code take points-to sets as part of their input. Points-to related data collect...
Paul Anderson, David Binkley, Genevieve Rosay, Tim...