Sciweavers

12183 search results - page 2428 / 2437
» Computers under Attacks!
Sort
View
CORR
2011
Springer
183views Education» more  CORR 2011»
12 years 11 months ago
Learning When Training Data are Costly: The Effect of Class Distribution on Tree Induction
For large, real-world inductive learning problems, the number of training examples often must be limited due to the costs associated with procuring, preparing, and storing the tra...
Foster J. Provost, Gary M. Weiss
CORR
2011
Springer
160views Education» more  CORR 2011»
12 years 11 months ago
Fundamentals of Inter-cell Overhead Signaling in Heterogeneous Cellular Networks
Heterogeneous base stations (e.g. picocells, microcells, femtocells and distributed antennas) will become increasingly essential for cellular network capacity and coverage. Up unt...
Ping Xia, Han-Shin Jo, Jeffrey G. Andrews
ICASSP
2011
IEEE
12 years 11 months ago
A method to infer emotions from facial Action Units
We present a robust method to map detected facial Action Units (AUs) to six basic emotions. Automatic AU recognition is prone to errors due to illumination, tracking failures and ...
Sudha Velusamy, Hariprasad Kannan, Balasubramanian...
INFOCOM
2011
IEEE
12 years 11 months ago
An analytical approach to real-time misbehavior detection in IEEE 802.11 based wireless networks
—The distributed nature of the CSMA/CA based wireless protocols, e.g., the IEEE 802.11 distributed coordinated function (DCF), allows malicious nodes to deliberately manipulate t...
Jin Tang, Yu Cheng, Weihua Zhuang
BMCBI
2011
12 years 11 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
« Prev « First page 2428 / 2437 Last » Next »