Sciweavers

2382 search results - page 446 / 477
» Generating Seeded Trees from Data Sets
Sort
View
ACSAC
2009
IEEE
14 years 3 months ago
An Empirical Approach to Modeling Uncertainty in Intrusion Analysis
: © An Empirical Approach to Modeling Uncertainty in Intrusion Analysis Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja Sakthivelmurugan HP Laboratories HPL-2009-334 intrusion de...
Xinming Ou, Siva Raj Rajagopalan, Sakthiyuvaraja S...
BMCBI
2008
123views more  BMCBI 2008»
13 years 8 months ago
Functional module detection by functional flow pattern mining in protein interaction networks
eraction networks. In this abstract, we extend this approach by mining functional flow patterns for the purpose of detecting small-sized modules for specific functions. Methods Our...
Young-Rae Cho, Lei Shi, Aidong Zhang
BMCBI
2005
94views more  BMCBI 2005»
13 years 8 months ago
A method for finding single-nucleotide polymorphisms with allele frequencies in sequences of deep coverage
Background: The allele frequencies of single-nucleotide polymorphisms (SNPs) are needed to select an optimal subset of common SNPs for use in association studies. Sequence-based m...
Jianmin Wang, Xiaoqiu Huang
ECCV
2000
Springer
14 years 10 months ago
Improvements to Gamut Mapping Colour Constancy Algorithms
Abstract. In his paper we introduce two improvements to the threedimensional gamut mapping approach to computational colour constancy. This approach consist of two separate parts. ...
Kobus Barnard
ISCA
2010
IEEE
405views Hardware» more  ISCA 2010»
14 years 1 months ago
Debunking the 100X GPU vs. CPU myth: an evaluation of throughput computing on CPU and GPU
Recent advances in computing have led to an explosion in the amount of data being generated. Processing the ever-growing data in a timely manner has made throughput computing an i...
Victor W. Lee, Changkyu Kim, Jatin Chhugani, Micha...