Sciweavers

59 search results - page 9 / 12
» Investigating Two Different Approaches for Encrypted Traffic...
Sort
View
BMCBI
2010
155views more  BMCBI 2010»
13 years 7 months ago
A bi-ordering approach to linking gene expression with clinical annotations in gastric cancer
Background: In the study of cancer genomics, gene expression microarrays, which measure thousands of genes in a single assay, provide abundant information for the investigation of...
Fan Shi, Christopher Leckie, Geoff MacIntyre, Izha...
ICETE
2004
204views Business» more  ICETE 2004»
13 years 8 months ago
A Real-Time Intrusion Prevention System for Commercial Enterprise Databases
: - Modern intrusion detection systems are comprised of three basically different approaches, host based, network based, and a third relatively recent addition called procedural ba...
Ulf T. Mattsson
CHI
2007
ACM
14 years 7 months ago
The relationship between accessibility and usability of websites
Accessibility and usability are well established concepts for user interfaces and websites. Usability is precisely defined, but there are different approaches to accessibility. In...
Helen Petrie, Omar Kheir
CVPR
2007
IEEE
14 years 9 months ago
Learning Object Material Categories via Pairwise Discriminant Analysis
In this paper, we investigate linear discriminant analysis (LDA) methods for multiclass classification problems in hyperspectral imaging. We note that LDA does not consider pairwi...
Zhouyu Fu, Antonio Robles-Kelly
JUCS
2008
157views more  JUCS 2008»
13 years 7 months ago
Using Conjunctions and Adverbs for Author Verification
: Linguistics and stylistics have been investigated for author identification for quite a while, but recently, we have testified a impressive growth in the volume with which lawyer...
Daniel Pavelec, Luiz S. Oliveira, Edson J. R. Just...