Sciweavers

6689 search results - page 1271 / 1338
» A Network Security Monitor
Sort
View
TPDS
2008
78views more  TPDS 2008»
13 years 9 months ago
Tracing Worm Break-In and Contaminations via Process Coloring: A Provenance-Preserving Approach
To detect and investigate self-propagating worm attacks against networked servers, the following capabilities are desirable: (1) raising timely alerts to trigger a worm investigat...
Xuxian Jiang, Florian P. Buchholz, Aaron Walters, ...
BMCBI
2004
135views more  BMCBI 2004»
13 years 9 months ago
Determination of the differentially expressed genes in microarray experiments using local FDR
Background: Thousands of genes in a genomewide data set are tested against some null hypothesis, for detecting differentially expressed genes in microarray experiments. The expect...
Julie Aubert, Avner Bar-Hen, Jean-Jacques Daudin, ...
CG
2004
Springer
13 years 9 months ago
ANTS--Augmented Environments
When interacting with natural or urban environments there are many situations where the ability to access data in real time becomes relevant. Augmented Reality (AR) technologies a...
Teresa Romão, Nuno Correia, A. Eduardo Dias...
BMCBI
2002
100views more  BMCBI 2002»
13 years 9 months ago
An algorithm and program for finding sequence specific oligo-nucleotide probes for species identification
Background: The identification of species or species groups with specific oligo-nucleotides as molecular signatures is becoming increasingly popular for bacterial samples. However...
Alexander E. Pozhitkov, Diethard Tautz
ICMLA
2010
13 years 8 months ago
Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets
Abstract--Clinical electroencephalography (EEG) is routinely used to monitor brain function in critically ill patients, and specific EEG waveforms are recognized by clinicians as s...
Drausin Wulsin, Justin Blanco, Ram Mani, Brian Lit...
« Prev « First page 1271 / 1338 Last » Next »