Sciweavers

123 search results - page 23 / 25
» A network intrusion detection method using independent compo...
Sort
View
HT
2006
ACM
14 years 2 months ago
A social hypertext model for finding community in blogs
Blogging has become the newest communication medium for creating a virtual community, a set of blogs linking back and forth to one another’s postings, while discussing common to...
Alvin Chin, Mark H. Chignell
BMCBI
2010
110views more  BMCBI 2010»
13 years 8 months ago
TimeDelay-ARACNE: Reverse engineering of gene networks from time-course data by an information theoretic approach
Background: One of main aims of Molecular Biology is the gain of knowledge about how molecular components interact each other and to understand gene function regulations. Using mi...
Pietro Zoppoli, Sandro Morganella, Michele Ceccare...
ICDE
2009
IEEE
216views Database» more  ICDE 2009»
13 years 6 months ago
Continuous Subgraph Pattern Search over Graph Streams
Search over graph databases has attracted much attention recently due to its usefulness in many fields, such as the analysis of chemical compounds, intrusion detection in network t...
Changliang Wang, Lei Chen 0002
ICMCS
2006
IEEE
215views Multimedia» more  ICMCS 2006»
14 years 2 months ago
Biologically vs. Logic Inspired Encoding of Facial Actions and Emotions in Video
Automatic facial expression analysis is an important aspect of Human Machine Interaction as the face is an important communicative medium. We use our face to signal interest, disa...
Michel François Valstar, Maja Pantic
FGR
2008
IEEE
184views Biometrics» more  FGR 2008»
14 years 3 months ago
Multi-attribute robust facial feature localization
In this paper, we focus on the reliable detection of facial fiducial points, such as eye, eyebrow and mouth corners. The proposed algorithm aims to improve automatic landmarking ...
Oya Çeliktutan, Hatice Cinar Akakin, Bü...