• Documents
  • Authors
  • Tables

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 13,848
Next 10 →

The WEKA Data Mining Software: An Update

by Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten
"... More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has an a ..."
Abstract - Cited by 1756 (15 self) - Add to MetaCart
More than twelve years have elapsed since the first public release of WEKA. In that time, the software has been rewritten entirely from scratch, evolved substantially and now accompanies a text on data mining [35]. These days, WEKA enjoys widespread acceptance in both academia and business, has

Toward a Conceptual Framework for Mixed-Method Evaluation Designs. Educational Evaluation and Policy Analysis

by Jennifer C. Greene, Valerie J. Caracelli, Wendy F. Graham , 1989
"... In recent years evaluators of educational and social programs have expanded their method-ological repertoire with designs that include the use of both qualitative and quantitative methods. Such practice, however, needs to be grounded in a theory that can meaningfully guide the design and implementat ..."
Abstract - Cited by 404 (3 self) - Add to MetaCart
-toire (Cook, 1985; Mathison, 1988). In re-cent years, this repertoire has been consid-erably expanded with the acceptance of qualitative methods as appropriate, legiti-mate, and even preferred for a wide range of evaluation settings and problems. Concom-itantly, evaluators have expressed renewed interest

Functional expression cloning of nanog, a pluripotency sustaining factor in embryonic stem cells

by Ian Chambers, Jennifer Nichols, Sonia Lee, Susan Tweedie, Austin Smith - Cell , 2003
"... doi:10.1016/S0092-8674(03)00392-1 This is a pre-copy-editing, author-produced PDF of an article accepted for inclusion in Cell, published by Elsevier following peer review. The publisher-authenticated version is available online at ..."
Abstract - Cited by 357 (7 self) - Add to MetaCart
doi:10.1016/S0092-8674(03)00392-1 This is a pre-copy-editing, author-produced PDF of an article accepted for inclusion in Cell, published by Elsevier following peer review. The publisher-authenticated version is available online at

On-line Fingerprint Verification

by Anil Jain, Lin Hong, Ruud Bolle - IEEE Transactions on Pattern Analysis and Machine Intelligence , 1997
"... Abstract—Fingerprint verification is one of the most reliable personal identification methods. However, manual fingerprint verification is so tedious, time-consuming, and expensive that it is incapable of meeting today’s increasing performance requirements. An automatic fingerprint identification sy ..."
Abstract - Cited by 300 (32 self) - Add to MetaCart
: minutia extraction and minutia matching. An improved version of the minutia extraction algorithm proposed by Ratha et al., which is much faster and more reliable, is implemented for extracting features from an input fingerprint image captured with an on-line inkless scanner. For minutia matching

Bitcoin: A peer-to-peer electronic cash system,” http://bitcoin.org/bitcoin.pdf

by Satoshi Nakamoto
"... www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third party ..."
Abstract - Cited by 246 (0 self) - Add to MetaCart
www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly from one party to another without going through a financial institution. Digital signatures provide part of the solution, but the main benefits are lost if a trusted third

A Stream Input-Output System

by Dennis M. Ritchie - AT&T Bell Laboratories Technical Journal , 1984
"... In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also co ..."
Abstract - Cited by 240 (1 self) - Add to MetaCart
In a new version of the Unix operating system, a flexible coroutine-based design replaces the traditional rigid connection between processes and terminals or networks. Processing modules may be inserted dynamically into the stream that connects a user's program to a device. Programs may also

Unconditional security of quantum key distribution over arbitrarily long distances

by Hoi-kwong Lo, H. F. Chau - Science , 1999
"... Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that, give ..."
Abstract - Cited by 172 (20 self) - Add to MetaCart
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device and channel noises has been missing. This long-standing problem is solved here by showing that

ACCEPTED VERSION

by David P Dimasi , Stuart M Pitson , Claudine S Bonder , David P Dimasi , Stuart M Pitson , Claudine S Bonder
"... Accepted (peer-reviewed) Version The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation a ..."
Abstract - Add to MetaCart
Accepted (peer-reviewed) Version The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation

ACCEPTED VERSION

by J R Metcalfe , N D'vaz , M Makrides , M S Gold , P Quinn , C E West , R Loh , S L Prescott , D J Palmer , J R Metcalfe , N D'vaz , M Makrides , M S Gold , P Quinn , C E West , R Loh , S L Prescott , D J Palmer
"... The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit in abst ..."
Abstract - Add to MetaCart
The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit

ACCEPTED VERSION

by L A Crocombe , D S Brennan , G D Slade , 2016
"... The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit in abst ..."
Abstract - Add to MetaCart
The accepted version of an article is the version that incorporates all amendments made during the peer review process, but prior to the final published version (the Version of Record, which includes; copy and stylistic edits, online and print formatting, citation and other linking, deposit
Next 10 →
Results 1 - 10 of 13,848
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University