Sciweavers

72 search results - page 14 / 15
» Improved Off-Line Intrusion Detection Using a Genetic Algori...
Sort
View
KDD
2008
ACM
183views Data Mining» more  KDD 2008»
14 years 7 months ago
Knowledge transfer via multiple model local structure mapping
The effectiveness of knowledge transfer using classification algorithms depends on the difference between the distribution that generates the training examples and the one from wh...
Jing Gao, Wei Fan, Jing Jiang, Jiawei Han
BMCBI
2004
208views more  BMCBI 2004»
13 years 7 months ago
Hybrid clustering for microarray image analysis combining intensity and shape features
Background: Image analysis is the first crucial step to obtain reliable results from microarray experiments. First, areas in the image belonging to single spots have to be identif...
Jörg Rahnenführer, Daniel Bozinov
VEE
2006
ACM
150views Virtualization» more  VEE 2006»
14 years 1 months ago
Evaluating fragment construction policies for SDT systems
Software Dynamic Translation (SDT) systems have been used for program instrumentation, dynamic optimization, security policy enforcement, intrusion detection, and many other uses....
Jason Hiser, Daniel Williams, Adrian Filipi, Jack ...
ICES
2005
Springer
176views Hardware» more  ICES 2005»
14 years 1 months ago
Consensus-Based Evaluation for Fault Isolation and On-line Evolutionary Regeneration
While the fault repair capability of Evolvable Hardware (EH) approaches have been previously demonstrated, further improvements to fault handling capability can be achieved by exp...
Kening Zhang, Ronald F. DeMara, Carthik A. Sharma
BMCBI
2010
131views more  BMCBI 2010»
13 years 7 months ago
JISTIC: Identification of Significant Targets in Cancer
Background: Cancer is caused through a multistep process, in which a succession of genetic changes, each conferring a competitive advantage for growth and proliferation, leads to ...
Felix Sanchez-Garcia, Uri David Akavia, Eyal Mozes...