Sciweavers

476 search results - page 71 / 96
» Analysis of signature change patterns
Sort
View
LISA
2007
13 years 11 months ago
NetADHICT: A Tool for Understanding Network Traffic
Computer and network administrators are often confused or uncertain about the behavior of their networks. Traditional analysis using IP ports, addresses, and protocols are insuffi...
Hajime Inoue, Dana Jansens, Abdulrahman Hijazi, An...
JSAC
2006
165views more  JSAC 2006»
13 years 8 months ago
Image-Based Anomaly Detection Technique: Algorithm, Implementation and Effectiveness
The frequent and large-scale network attacks have led to an increased need for developing techniques for analyzing network traffic. This paper presents NetViewer, a network measure...
Seong Soo Kim, A. L. Narasimha Reddy
PAMI
2000
113views more  PAMI 2000»
13 years 8 months ago
Hierarchical Discriminant Regression
This paper presents a new technique which incrementally builds a hierarchical discriminant regression (IHDR) tree for generation of motion based robot reactions. The robot learned...
Wey-Shiuan Hwang, Juyang Weng

Publication
218views
12 years 1 months ago
Comparing Visual Feature Coding for Learning Disjoint Camera Dependencies
This paper systematically investigates the effectiveness of different visual feature coding schemes for facilitating the learning of time-delayed dependencies among disjoint multi-...
Xiatian Zhu, Shaogang Gong, and Chen Change Loy
BMCBI
2010
133views more  BMCBI 2010»
13 years 8 months ago
Integrated prediction of one-dimensional structural features and their relationships with conformational flexibility in helical
Background: Many structural properties such as solvent accessibility, dihedral angles and helix-helix contacts can be assigned to each residue in a membrane protein. Independent s...
Shandar Ahmad, Yumlembam Hemjit Singh, Yogesh Paud...