Results 1 - 10
of
13,848
The WEKA Data Mining Software: An Update
"... More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has an a ..."
Abstract
-
Cited by 1756 (15 self)
- Add to MetaCart
More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has
Toward a Conceptual Framework for Mixed-Method Evaluation Designs. Educational Evaluation and Policy Analysis
, 1989
"... In recent years evaluators of educational and social programs have expanded their method-ological repertoire with designs that include the use of both qualitative and quantitative methods. Such practice, however, needs to be grounded in a theory that can meaningfully guide the design and implementat ..."
Abstract
-
Cited by 404 (3 self)
- Add to MetaCart
-toire (Cook, 1985; Mathison, 1988). In re-cent years, this repertoire has been consid-erably expanded with the acceptance of qualitative methods as appropriate, legiti-mate, and even preferred for a wide range of evaluation settings and problems. Concom-itantly, evaluators have expressed renewed interest
Functional expression cloning of nanog, a pluripotency sustaining factor in embryonic stem cells
- Cell
, 2003
"... doi:10.1016/S0092-8674(03)00392-1 This is a pre-copy-editing, author-produced PDF of an article accepted for inclusion in Cell, published by Elsevier following peer review. The publisher-authenticated version is available online at ..."
Abstract
-
Cited by 357 (7 self)
- Add to MetaCart
doi:10.1016/S0092-8674(03)00392-1 This is a pre-copy-editing, author-produced PDF of an article accepted for inclusion in Cell, published by Elsevier following peer review. The publisher-authenticated version is available online at
On-line Fingerprint Verification
- IEEE Transactions on Pattern Analysis and Machine Intelligence
, 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract
-
Cited by 300 (32 self)
- Add to MetaCart
: minutia extraction and minutia matching. An improved version of the minutia extraction algorithm proposed by Ratha et al., which is much faster and more reliable, is implemented for extracting features from an input fingerprint image captured with an on-line inkless scanner. For minutia matching
Bitcoin: A peer-to-peer electronic cash system,” http://bitcoin.org/bitcoin.pdf
"... www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party ..."
Abstract
-
Cited by 246 (0 self)
- Add to MetaCart
www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third
A Stream Input-Output System
- AT&T Bell Laboratories Technical Journal
, 1984
"... In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also co ..."
Abstract
-
Cited by 240 (1 self)
- Add to MetaCart
In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also
Unconditional security of quantum key distribution over arbitrarily long distances
- Science
, 1999
"... Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, give ..."
Abstract
-
Cited by 172 (20 self)
- Add to MetaCart
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that
ACCEPTED VERSION
"... Accepted (peer-reviewed) Version The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation a ..."
Abstract
- Add to MetaCart
Accepted (peer-reviewed) Version The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation
ACCEPTED VERSION
"... The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit in abst ..."
Abstract
- Add to MetaCart
The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit
ACCEPTED VERSION
, 2016
"... The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit in abst ..."
Abstract
- Add to MetaCart
The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit
Results 1 - 10
of
13,848