Sciweavers

587 search results - page 84 / 118
» Anomaly Detection Using Call Stack Information
Sort
View
ISMB
1996
13 years 10 months ago
Gene Recognition in Cyanobacterium Genomic Sequence Data Using the Hidden Markov Model
We have developed a hidden Markov model (HMM)to detect the protein coding regions within one megabase contiguous sequence data, registered in a database called GenBankin eight ent...
Tetsushi Yada, Makoto Hirosawa
CIKM
2009
Springer
14 years 11 days ago
Mining data streams with periodically changing distributions
Dynamic data streams are those whose underlying distribution changes over time. They occur in a number of application domains, and mining them is important for these applications....
Yingying Tao, M. Tamer Özsu
OOPSLA
2005
Springer
14 years 2 months ago
Finding application errors and security flaws using PQL: a program query language
A number of effective error detection tools have been built in recent years to check if a program conforms to certain design rules. An important class of design rules deals with s...
Michael C. Martin, V. Benjamin Livshits, Monica S....
HICSS
2007
IEEE
105views Biometrics» more  HICSS 2007»
14 years 3 months ago
Juggling Work Among Multiple Projects and Partner
Prior research suggests people have trouble juggling effort across multiple projects with multiple partners. We investigated this problem, with an experiment where groups of four ...
Peter Scupelli, Susan R. Fussell, Sara B. Kiesler,...
HUC
2009
Springer
14 years 1 months ago
Recognizing daily activities with RFID-based sensors
We explore a dense sensing approach that uses RFID sensor network technology to recognize human activities. In our setting, everyday objects are instrumented with UHF RFID tags ca...
Michael Buettner, Richa Prasad, Matthai Philipose,...