Sciweavers

2180 search results - page 353 / 436
» Algorithms for discovering bucket orders from data
Sort
View
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 10 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
CSB
2005
IEEE
143views Bioinformatics» more  CSB 2005»
15 years 10 months ago
Multivariate gene selection: Does it help
When building predictors of disease state based on gene expression data, gene selection is performed in order to achieve a good performance and to identify a relevant subset of ge...
Carmen Lai, Marcel J. T. Reinders
ICIP
2009
IEEE
15 years 11 months ago
A Novel Framework for Imaging Using Compressed Sensing
Recently, there has been growing interest in using compressed sensing to perform imaging. Most of these algorithms capture the image of a scene by taking projections of the imaged ...
Pradeep Sen and Soheil Darabi
IFIP
1989
Springer
15 years 8 months ago
Software Fault Tolerance
The designation “fault tolerant software” has been used for techniques ranging from roll-back and retry to N-version programming, from data mirroring to functional redundancy....
Algirdas Avizienis
APWEB
2006
Springer
15 years 8 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa