Sciweavers

429 search results - page 72 / 86
» Multivariate statistical analysis for network attacks detect...
Sort
View
PR
2007
101views more  PR 2007»
13 years 7 months ago
Use of power law models in detecting region of interest
In this paper, we shall address the issue of semantic extraction of different regions of interest. The proposed approach is based on statistical methods and models inspired from l...
Yves Caron, Pascal Makris, Nicole Vincent
ISBI
2006
IEEE
14 years 8 months ago
Classification of galactograms using fractal properties of the breast ductal network
Several types of breast carcinomas tend to spread along the surface of the ductal lumen. Spontaneous nipple discharge can be an early symptom of such cancer development that does ...
Despina Kontos, Vasileios Megalooikonomou, Ailar J...
WPES
2006
ACM
14 years 2 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov
BMCBI
2008
143views more  BMCBI 2008»
13 years 8 months ago
catmap: Case-control And TDT Meta-Analysis Package
Background: Risk for complex disease is thought to be controlled by multiple genetic risk factors, each with small individual effects. Meta-analyses of several independent studies...
Kristin K. Nicodemus
INFOCOM
2010
IEEE
13 years 6 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot