Sciweavers

762 search results - page 129 / 153
» Finding SHA-1 Characteristics: General Results and Applicati...
Sort
View
KAIS
2006
110views more  KAIS 2006»
13 years 8 months ago
Multi-step density-based clustering
Abstract. Data mining in large databases of complex objects from scientific, engineering or multimedia applications is getting more and more important. In many areas, complex dista...
Stefan Brecheisen, Hans-Peter Kriegel, Martin Pfei...
BMCBI
2010
161views more  BMCBI 2010»
13 years 5 months ago
Addressing the Challenge of Defining Valid Proteomic Biomarkers and Classifiers
Background: The purpose of this manuscript is to provide, based on an extensive analysis of a proteomic data set, suggestions for proper statistical analysis for the discovery of ...
Mohammed Dakna, Keith Harris, Alexandros Kalousis,...
CHI
2011
ACM
13 years 1 hour ago
No clicks, no problem: using cursor movements to understand and improve search
Understanding how people interact with search engines is important in improving search quality. Web search engines typically analyze queries and clicked results, but these actions...
Jeff Huang, Ryen W. White, Susan T. Dumais
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
MOBIHOC
2009
ACM
14 years 9 months ago
Fault tolerant target tracking in sensor networks
In this paper, we present a Gaussian mixture model based approach to capture the spatial characteristics of any target signal in a sensor network, and further propose a temporally...
Min Ding, Xiuzhen Cheng