Abstract. Most intrusion detection systems deployed today apply misuse detection as detection procedure. Misuse detection compares the recorded audit data with predefined patterns,...
Model order selection and cue combination are both difficult open problems in the area of clustering. In this work we build upon stability-based approaches to develop a new method...
Andrew Rabinovich, Serge Belongie, Tilman Lange, J...
Abstract—Spectrum sensing is one of the key enabling technologies in Cognitive Radio Networks (CRNs). In CRNs, secondary users (SUs) are allowed to exploit the spectrum opportuni...
Yanyan Yang, Yunhuai Liu, Qian Zhang, Lionel M. Ni
We describe a clustering algorithm based on continuous Hidden Markov Models (HMM) to automatically classify both electrocardiogram (ECG) and intracranial pressure (ICP) beats base...
De novo Sequencing of peptides is a challenging task in proteome research. While there exist reliable DNA-sequencing methods, the highthroughput de novo sequencing of proteins by ...
Bernd Fischer, Volker Roth, Joachim M. Buhmann, Jo...