Sciweavers

2346 search results - page 465 / 470
» Discovering Case Knowledge Using Data Mining
Sort
View
SP
2010
IEEE
210views Security Privacy» more  SP 2010»
13 years 11 months ago
Reconciling Belief and Vulnerability in Information Flow
Abstract—Belief and vulnerability have been proposed recently to quantify information flow in security systems. Both concepts stand as alternatives to the traditional approaches...
Sardaouna Hamadou, Vladimiro Sassone, Catuscia Pal...
BMCBI
2010
175views more  BMCBI 2010»
13 years 7 months ago
Global parameter estimation methods for stochastic biochemical systems
Background: The importance of stochasticity in cellular processes having low number of molecules has resulted in the development of stochastic models such as chemical master equat...
Suresh Kumar Poovathingal, Rudiyanto Gunawan
PR
2006
164views more  PR 2006»
13 years 7 months ago
Locally linear metric adaptation with application to semi-supervised clustering and image retrieval
Many computer vision and pattern recognition algorithms are very sensitive to the choice of an appropriate distance metric. Some recent research sought to address a variant of the...
Hong Chang, Dit-Yan Yeung
TSP
2010
13 years 2 months ago
Training Sequence Design for Discriminatory Channel Estimation in Wireless MIMO Systems
Abstract--This paper proposes a training-based channel estimation scheme for achieving quality-of-service discrimination between legitimate and unauthorized receivers in wireless m...
Tsung-Hui Chang, Wei-Cheng Chiang, Yao-Win Peter H...
NIPS
1996
13 years 8 months ago
Neural Models for Part-Whole Hierarchies
We present a connectionist method for representing images that explicitlyaddresses their hierarchicalnature. It blends data fromneuroscience about whole-object viewpoint sensitive...
Maximilian Riesenhuber, Peter Dayan