Sciweavers

1123 search results - page 144 / 225
» Analysis of Timed Processes with Data Using Algebraic Transf...
Sort
View
SPIN
2009
Springer
15 years 9 months ago
Identifying Modeling Errors in Signatures by Model Checking
: Most intrusion detection systems deployed today apply misuse detection as analysis method. Misuse detection searches for attack traces in the recorded audit data using predefined...
Sebastian Schmerl, Michael Vogel, Hartmut Kön...
116
Voted
BMCBI
2010
135views more  BMCBI 2010»
15 years 2 months ago
Efficient genome-scale phylogenetic analysis under the duplication-loss and deep coalescence cost models
Background: Genomic data provide a wealth of new information for phylogenetic analysis. Yet making use of this data requires phylogenetic methods that can efficiently analyze extr...
Mukul S. Bansal, J. Gordon Burleigh, Oliver Eulens...
145
Voted
BMCBI
2008
129views more  BMCBI 2008»
15 years 2 months ago
Motif-directed network component analysis for regulatory network inference
Background: Network Component Analysis (NCA) has shown its effectiveness in discovering regulators and inferring transcription factor activities (TFAs) when both microarray data a...
Chen Wang, Jianhua Xuan, Li Chen, Po Zhao, Yue Wan...
136
Voted
ROBOCUP
2001
Springer
138views Robotics» more  ROBOCUP 2001»
15 years 7 months ago
Interpretation of Spatio-temporal Relations in Real-Time and Dynamic Environments
With the more sophisticated abilities of teams within the simulation league high level online functions become more and more attractive. Last year we proposed an approach to recogn...
Andrea Miene, Ubbo Visser
116
Voted
IJCV
1998
105views more  IJCV 1998»
15 years 2 months ago
Robust Algorithms for Object Localization
Object localization using sensed data features and corresponding model features is a fundamental problem in machine vision. We reformulate object localization as a least squares p...
Aaron S. Wallack, Dinesh Manocha