Sciweavers

4350 search results - page 864 / 870
» Case studies for contract-based systems
Sort
View
IJNSEC
2007
125views more  IJNSEC 2007»
13 years 7 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
SPEECH
2008
97views more  SPEECH 2008»
13 years 7 months ago
A new approach for the adaptation of HMMs to reverberation and background noise
Looking at practical application scenarios of speech recognition systems several distortion effects exist that have a major influence on the speech signal and can considerably det...
Hans-Günter Hirsch, Harald Finster
INFORMATICALT
2007
136views more  INFORMATICALT 2007»
13 years 7 months ago
Generic Multimedia Database Architecture Based upon Semantic Libraries
Semantic-based storage and retrieval of multimedia data requires accurate annotation of the data. Annotation can be done either manually or automatically. The retrieval performance...
Omara Abdul Hamid, Muhammad Abdul Qadir, Nadeem If...
BMCBI
2005
131views more  BMCBI 2005»
13 years 7 months ago
Regularized Least Squares Cancer Classifiers from DNA microarray data
Background: The advent of the technology of DNA microarrays constitutes an epochal change in the classification and discovery of different types of cancer because the information ...
Nicola Ancona, Rosalia Maglietta, Annarita D'Addab...
JSS
2007
105views more  JSS 2007»
13 years 7 months ago
Composing pattern-based components and verifying correctness
Designing large software systems out of reusable components has become increasingly popular. Although liberal composition of reusable components saves time and expense, many exper...
Jing Dong, Paulo S. C. Alencar, Donald D. Cowan, S...