Sciweavers

1561 search results - page 239 / 313
» Evaluating different methods of microarray data normalizatio...
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 3 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
SEMWEB
2005
Springer
14 years 2 months ago
Rapid Benchmarking for Semantic Web Knowledge Base Systems
Abstract. We present a method for rapid development of benchmarks for Semantic Web knowledge base systems. At the core, we have a synthetic data generation approach for OWL that is...
Sui-Yu Wang, Yuanbo Guo, Abir Qasem, Jeff Heflin
SEKE
2007
Springer
14 years 2 months ago
Adjudicator: A Statistical Approach for Learning Ontology Concepts from Peer Agents
— We present a statistical approach for software agents to learn ontology concepts from peer agents by asking them whether they can reach consensus on significant differences bet...
Behrouz Homayoun Far, Abdel Halim Elamy, Nora Houa...
ICB
2007
Springer
117views Biometrics» more  ICB 2007»
14 years 20 days ago
Curvewise DET Confidence Regions and Pointwise EER Confidence Intervals Using Radial Sweep Methodology
One methodology for evaluating the matching performance of biometric authentication systems is the detection error tradeoff (DET) curve. The DET curve graphically illustrates the r...
Michael E. Schuckers, Yordan Minev, Andy Adler
BMCBI
2005
120views more  BMCBI 2005»
13 years 8 months ago
Robust detection of periodic time series measured from biological systems
Background: Periodic phenomena are widespread in biology. The problem of finding periodicity in biological time series can be viewed as a multiple hypothesis testing of the spectr...
Miika Ahdesmäki, Harri Lähdesmäki, ...