Sciweavers

268 search results - page 44 / 54
» Locating Hidden Groups in Communication Networks Using Hidde...
Sort
View
JMLR
2010
185views more  JMLR 2010»
13 years 2 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
PERCOM
2006
ACM
14 years 7 months ago
A Keystroke and Pointer Control Input Interface for Wearable Computers
The widespread adoption of mobile electronic devices and the advent of wearable computing has encouraged the development of compact alternatives to the keyboard and mouse. These i...
Farooq Ahmad, Petr Musílek
RAS
2000
187views more  RAS 2000»
13 years 7 months ago
Detection, tracking, and classification of action units in facial expression
Most of the current work on automated facial expression analysis attempt to recognize a small set of prototypic expressions, such as joy and fear. Such prototypic expressions, how...
James Jenn-Jier Lien, Takeo Kanade, Jeffrey F. Coh...
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
Inferring transcriptional compensation interactions in yeast via stepwise structure equation modeling
Background: With the abundant information produced by microarray technology, various approaches have been proposed to infer transcriptional regulatory networks. However, few appro...
Grace S. Shieh, Chung-Ming Chen, Ching-Yun Yu, Jui...
FOCI
2007
IEEE
14 years 2 months ago
Almost All Learning Machines are Singular
— A learning machine is called singular if its Fisher information matrix is singular. Almost all learning machines used in information processing are singular, for example, layer...
Sumio Watanabe