Sciweavers

2236 search results - page 256 / 448
» Intrusion detection techniques and approaches
Sort
View
ITIIS
2010
223views more  ITIIS 2010»
13 years 9 months ago
An Adaptive FEC Mechanism Using Cross-layer Approach to Enhance Quality of Video Transmission over 802.11 WLANs
Forward Error Correction (FEC) techniques have been adopted to overcome packet losses and to improve the quality of video delivery. The efficiency of the FEC has been significantl...
Longzhe Han, Sungjun Park, Seung-Seok Kang, Hoh Pe...
ECIR
2009
Springer
14 years 8 months ago
Investigating Learning Approaches for Blog Post Opinion Retrieval
Blog post opinion retrieval is the problem of identifying posts which express an opinion about a particular topic. Usually the problem is solved using a 3 step process in which rel...
Shima Gerani, Mark James Carman, Fabio Crestani
CASES
2003
ACM
14 years 2 months ago
A hierarchical approach for energy efficient application design using heterogeneous embedded systems
Several features such as reconfiguration, voltage and frequency scaling, low-power operating states, duty-cycling, etc. are exploited for latency and energy efficient application ...
Sumit Mohanty, Viktor K. Prasanna
BMCBI
2010
158views more  BMCBI 2010»
13 years 11 months ago
A Bayesian network approach to feature selection in mass spectrometry data
Background: Time-of-flight mass spectrometry (TOF-MS) has the potential to provide non-invasive, high-throughput screening for cancers and other serious diseases via detection of ...
Karl W. Kuschner, Dariya I. Malyarenko, William E....
BMCBI
2010
155views more  BMCBI 2010»
13 years 11 months ago
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
Background: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of...
Fan Shi, Christopher Leckie, Geoff MacIntyre, Izha...