Sciweavers

2236 search results - page 429 / 448
» Intrusion detection techniques and approaches
Sort
View
BMCBI
2005
122views more  BMCBI 2005»
13 years 7 months ago
Computational verification of protein-protein interactions by orthologous co-expression
Background: High-throughput methods identify an overwhelming number of protein-protein interactions. However, the limited accuracy of these methods results in the false identifica...
Itay Tirosh, Naama Barkai
AIR
1998
160views more  AIR 1998»
13 years 7 months ago
Automatic Plankton Image Recognition
Plankton form the base of the food chain in the ocean and are fundamental to marine ecosystem dynamics. The rapid mapping of plankton abundance together with taxonomic and size com...
Xiaoou Tang, W. Kenneth Stewart, He Huang, Scott M...
VTC
2010
IEEE
140views Communications» more  VTC 2010»
13 years 6 months ago
To Cooperate or Not: A Capacity Perspective
Abstract—It is widely recognized that differential decode-andforward (DDF) cooperative transmission scheme is capable of providing a superior performance compared to classic dire...
Li Wang, Lingkun Kong, Soon Xin Ng, Lajos Hanzo
LOGCOM
2010
154views more  LOGCOM 2010»
13 years 2 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...
MIA
2011
170views more  MIA 2011»
13 years 2 months ago
Robust statistical shape models for MRI bone segmentation in presence of small field of view
Accurate bone modeling from medical images is essential in the diagnosis and treatment of patients because it supports the detection of abnormal bone morphology, which is often re...
Jérôme Schmid, Jinman Kim, Nadia Magn...