Sciweavers

2925 search results - page 537 / 585
» Input Modeling Using Quantile Statistical Methods
Sort
View
HICSS
2009
IEEE
209views Biometrics» more  HICSS 2009»
14 years 2 months ago
SIDD: A Framework for Detecting Sensitive Data Exfiltration by an Insider Attack
Detecting and mitigating insider threat is a critical element in the overall information protection strategy. By successfully implementing tactics to detect this threat, organizat...
Yali Liu, Cherita L. Corbett, Ken Chiang, Rennie A...
ISBI
2009
IEEE
14 years 2 months ago
A Compressed Sensing Approach for Biological Microscopic Image Processing
In fluorescence microscopy the noise level and the photobleaching are cross-dependent problems since reducing exposure time to reduce photobleaching degrades image quality while ...
Marcio de Moraes Marim, Elsa D. Angelini, Jean-Chr...
KDD
2009
ACM
169views Data Mining» more  KDD 2009»
14 years 2 months ago
On burstiness-aware search for document sequences
As the number and size of large timestamped collections (e.g. sequences of digitized newspapers, periodicals, blogs) increase, the problem of efficiently indexing and searching su...
Theodoros Lappas, Benjamin Arai, Manolis Platakis,...
PAKDD
2009
ACM
112views Data Mining» more  PAKDD 2009»
14 years 2 months ago
Romanization of Thai Proper Names Based on Popularity of Usages
The lack of standards for Romanization of Thai proper names makes searching activity a challenging task. This is particularly important when searching for people-related documents ...
Akegapon Tangverapong, Atiwong Suchato, Proadpran ...
IDA
2009
Springer
14 years 2 months ago
Estimating Squared-Loss Mutual Information for Independent Component Analysis
Abstract. Accurately evaluating statistical independence among random variables is a key component of Independent Component Analysis (ICA). In this paper, we employ a squared-loss ...
Taiji Suzuki, Masashi Sugiyama