Sciweavers

111 search results - page 20 / 23
» Comparing similarity calculation methods in conversational C...
Sort
View
RAID
2004
Springer
14 years 1 months ago
Anomalous Payload-Based Network Intrusion Detection
We present a payload-based anomaly detector, we call PAYL, for intrusion detection. PAYL models the normal application payload of network traffic in a fully automatic, unsupervised...
Ke Wang, Salvatore J. Stolfo
DAGSTUHL
2007
13 years 10 months ago
Energy Scalability and the RESUME Scalable Video Codec
In the context of the RESUME-project a scalable wavelet-based video decoder was built to demonstrate the benefits of reconfigurable hardware for scalable applications. Scalable v...
Harald Devos, Hendrik Eeckhaut, Mark Christiaens, ...
BMCBI
2006
213views more  BMCBI 2006»
13 years 8 months ago
CoXpress: differential co-expression in gene expression data
Background: Traditional methods of analysing gene expression data often include a statistical test to find differentially expressed genes, or use of a clustering algorithm to find...
Michael Watson
CIKM
2009
Springer
14 years 3 months ago
Feature selection for ranking using boosted trees
Modern search engines have to be fast to satisfy users, so there are hard back-end latency requirements. The set of features useful for search ranking functions, though, continues...
Feng Pan, Tim Converse, David Ahn, Franco Salvetti...
BMCBI
2007
135views more  BMCBI 2007»
13 years 8 months ago
Automatic extraction of reliable regions from multiple sequence alignments
Background: High quality multiple alignments are crucial in the transfer of annotation from one genome to another. Multiple alignment methods strive to achieve ever increasing lev...
Timo Lassmann, Erik L. L. Sonnhammer