Sciweavers

1274 search results - page 253 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
BMCBI
2010
202views more  BMCBI 2010»
13 years 7 months ago
NeMo: Network Module identification in Cytoscape
Background: As the size of the known human interactome grows, biologists increasingly rely on computational tools to identify patterns that represent protein complexes and pathway...
Corban G. Rivera, Rachit Vakil, Joel S. Bader
SECON
2008
IEEE
14 years 1 months ago
On the Pitfalls of High-Throughput Multicast Metrics in Adversarial Wireless Mesh Networks
—Recent work in multicast routing for wireless mesh networks has focused on metrics that estimate link quality to maximize throughput. Nodes must collaborate in order to compute ...
Jing Dong, Reza Curtmola, Cristina Nita-Rotaru
DSMML
2004
Springer
14 years 26 days ago
Object Recognition via Local Patch Labelling
Abstract. In recent years the problem of object recognition has received considerable attention from both the machine learning and computer vision communities. The key challenge of...
Christopher M. Bishop, Ilkay Ulusoy
ENGL
2007
130views more  ENGL 2007»
13 years 7 months ago
Wavelet Based Classification for Cancer Diagnosis
— We make use of discrete wavelets to extract distinguishing features between normal and cancerous human breast tissue fluorescence spectra. These are then used in conjunction wi...
Bhadra Mani, C. Raghavendra Rao, P. Anantha Lakshm...
AND
2010
13 years 5 months ago
Reshaping automatic speech transcripts for robust high-level spoken document analysis
High-level spoken document analysis is required in many applications seeking access to the semantic content of audio data, such as information retrieval, machine translation or au...
Julien Fayolle, Fabienne Moreau, Christian Raymond...