Sciweavers

7978 search results - page 1583 / 1596
» Combining shared-coin algorithms
Sort
View
TIFS
2008
154views more  TIFS 2008»
13 years 7 months ago
Data Fusion and Cost Minimization for Intrusion Detection
Abstract--Statistical pattern recognition techniques have recently been shown to provide a finer balance between misdetections and false alarms than the more conventional intrusion...
Devi Parikh, Tsuhan Chen
TIP
2008
169views more  TIP 2008»
13 years 7 months ago
Weakly Supervised Learning of a Classifier for Unusual Event Detection
In this paper, we present an automatic classification framework combining appearance based features and Hidden Markov Models (HMM) to detect unusual events in image sequences. One...
Mark Jager, Christian Knoll, Fred A. Hamprecht
TIP
2008
133views more  TIP 2008»
13 years 7 months ago
A Recursive Model-Reduction Method for Approximate Inference in Gaussian Markov Random Fields
This paper presents recursive cavity modeling--a principled, tractable approach to approximate, near-optimal inference for large Gauss-Markov random fields. The main idea is to su...
Jason K. Johnson, Alan S. Willsky
BMCBI
2005
112views more  BMCBI 2005»
13 years 7 months ago
Vector analysis as a fast and easy method to compare gene expression responses between different experimental backgrounds
Background: Gene expression studies increasingly compare expression responses between different experimental backgrounds (genetic, physiological, or phylogenetic). By focusing on ...
Rainer Breitling, Patrick Armengaud, Anna Amtmann
BMCBI
2005
109views more  BMCBI 2005»
13 years 7 months ago
Genome comparison without alignment using shortest unique substrings
Background: Sequence comparison by alignment is a fundamental tool of molecular biology. In this paper we show how a number of sequence comparison tasks, including the detection o...
Bernhard Haubold, Nora Pierstorff, Friedrich M&oum...
« Prev « First page 1583 / 1596 Last » Next »