Sciweavers

495 search results - page 48 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
RECOMB
2007
Springer
14 years 4 months ago
Nucleosome Occupancy Information Improves de novo Motif Discovery
A complete understanding of transcriptional regulatory processes in the cell requires identification of transcription factor binding sites on a genomewide scale. Unfortunately, th...
Leelavati Narlikar, Raluca Gordân, Alexander...
IMC
2006
ACM
14 years 4 months ago
Semi-automated discovery of application session structure
While the problem of analyzing network traffic at the granularity of individual connections has seen considerable previous work and tool development, understanding traffic at a ...
Jayanthkumar Kannan, Jaeyeon Jung, Vern Paxson, Ca...
JCDL
2011
ACM
272views Education» more  JCDL 2011»
13 years 28 days ago
CollabSeer: a search engine for collaboration discovery
Collaborative research has been increasingly popular and important in academic circles. However, there is no open platform available for scholars or scientists to effectively dis...
Hung-Hsuan Chen, Liang Gou, Xiaolong Zhang, Clyde ...
ICASSP
2011
IEEE
13 years 1 months ago
Detection of synthetic speech for the problem of imposture
In this paper, we present new results from our research into the vulnerability of a speaker verification (SV) system to synthetic speech. We use a HMM-based speech synthesizer, w...
Phillip L. De Leon, Inma Hernáez, Ibon Sara...
LWA
2008
13 years 11 months ago
A Comparison of Techniques for Selecting and Combining Class Association Rules
Local pattern discovery, pattern set formation and global modeling may be viewed as three consecutive steps in a global modeling process. As each of these three steps have gained a...
Jan-Nikolas Sulzmann, Johannes Fürnkranz