Sciweavers

1580 search results - page 24 / 316
» Non-Interference Through Determinism
Sort
View
SIBGRAPI
2008
IEEE
14 years 3 months ago
Bayesian Estimation of Hyperparameters in MRI through the Maximum Evidence Method
Bayesian inference methods are commonly applied to the classification of brain Magnetic Resonance images (MRI). We use the Maximum Evidence (ME) approach to estimate the most prob...
Damian E. Oliva, Roberto A. Isoardi, Germán...
AUSDM
2007
Springer
84views Data Mining» more  AUSDM 2007»
14 years 2 months ago
Detecting Anomalous Longitudinal Associations Through Higher Order Mining
The detection of unusual or anomalous data is an important function in automated data analysis or data mining. However, the diversity of anomaly detection algorithms shows that it...
Ping Liang, John F. Roddick
COMPSAC
2005
IEEE
14 years 2 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...
PAKDD
2005
ACM
168views Data Mining» more  PAKDD 2005»
14 years 2 months ago
Adaptive Nonlinear Auto-Associative Modeling Through Manifold Learning
We propose adaptive nonlinear auto-associative modeling (ANAM) based on Locally Linear Embedding algorithm (LLE) for learning intrinsic principal features of each concept separatel...
Junping Zhang, Stan Z. Li
HICSS
2010
IEEE
152views Biometrics» more  HICSS 2010»
14 years 1 months ago
Increasing Software Security through Open Source or Closed Source Development? Empirics Suggest that We have Asked the Wrong Que
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments...
Guido Schryen, Eliot Rich