Sciweavers

1679 search results - page 38 / 336
» Evaluation by comparing result sets in context
Sort
View
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das
BMCBI
2008
134views more  BMCBI 2008»
13 years 7 months ago
Identification of transcription factor contexts in literature using machine learning approaches
Background: Availability of information about transcription factors (TFs) is crucial for genome biology, as TFs play a central role in the regulation of gene expression. While man...
Hui Yang, Goran Nenadic, John A. Keane
CHI
2007
ACM
14 years 8 months ago
Context & usability testing: user-modeled information presentation in easy and difficult driving conditions
A 2x2 enhanced Wizard-of-Oz experiment (N = 32) was conducted to compare two different approaches to presenting information to drivers in easy and difficult driving conditions. Da...
Jiang Hu, Andi Winterboer, Clifford Nass, Johanna ...
CLEF
2010
Springer
13 years 8 months ago
DAEDALUS at ImageCLEF Wikipedia Retrieval 2010: Expanding with Semantic Information from Context
This paper describes the participation of DAEDALUS at the ImageCLEF 2010 Wikipedia Retrieval task. The main focus of our experiments is to evaluate the impact in the image retrieva...
Sara Lana-Serrano, Julio Villena-Román, Jos...
ICCV
2005
IEEE
14 years 9 months ago
Local Features for Object Class Recognition
In this paper we compare the performance of local detectors and descriptors in the context of object class recognition. Recently, many detectors / descriptors have been evaluated ...
Krystian Mikolajczyk, Bastian Leibe, Bernt Schiele