Sciweavers

252 search results - page 44 / 51
» Experimenting with Server-Aided Signatures
Sort
View
ISI
2007
Springer
13 years 7 months ago
Host Based Intrusion Detection using Machine Learning
—Detecting unknown malicious code (malcode) is a challenging task. Current common solutions, such as anti-virus tools, rely heavily on prior explicit knowledge of specific instan...
Robert Moskovitch, Shay Pluderman, Ido Gus, Dima S...
BC
2000
81views more  BC 2000»
13 years 7 months ago
Insect visual homing strategies in a robot with analog processing
Abstract The visual homing abilities of insects can be explained by the snapshot hypothesis. It asserts that an animal is guided to a previously visited location by comparing the c...
Ralf Möller
BMCBI
2010
181views more  BMCBI 2010»
13 years 7 months ago
Intensity dependent estimation of noise in microarrays improves detection of differentially expressed genes
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...
Amit Zeisel, Amnon Amir, Wolfgang J. Köstler,...
BMCBI
2005
140views more  BMCBI 2005»
13 years 7 months ago
Dissecting systems-wide data using mixture models: application to identify affected cellular processes
Background: Functional analysis of data from genome-scale experiments, such as microarrays, requires an extensive selection of differentially expressed genes. Under many condition...
J. Peter Svensson, Renée X. de Menezes, Ing...
MICCAI
1999
Springer
13 years 11 months ago
Analysis of Functional MRI Data Using Mutual Information
Abstract. A new information-theoretic approach is presented for analyzing fMRI data to calculate the brain activation map. The method is based on a formulation of the mutualinforma...
Andy Tsai, John W. Fisher III, Cindy Wible, Willia...