Sciweavers

79 search results - page 5 / 16
» Combining email models for false positive reduction
Sort
View
BMCBI
2007
134views more  BMCBI 2007»
13 years 7 months ago
A framework for significance analysis of gene expression data using dimension reduction methods
Background: The most popular methods for significance analysis on microarray data are well suited to find genes differentially expressed across predefined categories. However, ide...
Lars Halvor Gidskehaug, Endre Anderssen, Arnar Fla...
ICRA
1999
IEEE
109views Robotics» more  ICRA 1999»
13 years 11 months ago
Image-Based Robot Navigation Under the Perspective Model
In a recent paper we have presented a method for image-based navigation by which a robot can navigate to desired positions and orientations in 3-0 space specified by single images...
Ronen Basri, Ehud Rivlin, Ilan Shimshoni
WWW
2007
ACM
14 years 8 months ago
Cantina: a content-based approach to detecting phishing web sites
Phishing is a significant problem involving fraudulent email and web sites that trick unsuspecting users into revealing private information. In this paper, we present the design, ...
Jason I. Hong, Lorrie Faith Cranor, Yue Zhang 0002
ICASSP
2008
IEEE
14 years 1 months ago
Information theoretic bounds on neural prosthesis effectiveness: The importance of spike sorting
We compute the capacity of neural prostheses using a vector Poisson process model for the neural population channel. For single-electrode stimulation prostheses, the capacity is p...
Ilan N. Goodman, Don H. Johnson
PODS
2009
ACM
130views Database» more  PODS 2009»
14 years 8 months ago
Secondary indexing in one dimension: beyond b-trees and bitmap indexes
Let be a finite, ordered alphabet, and consider a string x = x1x2 . . . xn n . A secondary index for x answers alphabet range queries of the form: Given a range [al, ar] , retu...
Rasmus Pagh, Srinivasa Rao Satti