Sciweavers

273 search results - page 20 / 55
» On the Contributions of Different Empirical Data in Usabilit...
Sort
View
PTS
2007
120views Hardware» more  PTS 2007»
13 years 8 months ago
Towards Systematic Signature Testing
: The success and the acceptance of intrusion detection systems essentially depend on the accuracy of their analysis. Inaccurate signatures strongly trigger false alarms. In practi...
Sebastian Schmerl, Hartmut König
BMCBI
2006
200views more  BMCBI 2006»
13 years 7 months ago
Comparison and evaluation of methods for generating differentially expressed gene lists from microarray data
Background: Numerous feature selection methods have been applied to the identification of differentially expressed genes in microarray data. These include simple fold change, clas...
Ian B. Jeffery, Desmond G. Higgins, Aedín C...
RSS
2007
192views Robotics» more  RSS 2007»
13 years 8 months ago
Simultaneous Localisation and Mapping in Dynamic Environments (SLAMIDE) with Reversible Data Associa
Abstract— The conventional technique for dealing with dynamic objects in SLAM is to detect them and then either treat them as outliers [20][1] or track them separately using trad...
Charles Bibby, Ian D. Reid
CHINZ
2005
ACM
13 years 9 months ago
The territory is the map: designing navigational aids
It has been shown that people encounter difficulties in using representations and devices designed to assist navigating unfamiliar terrain. Literature review and self-reported vis...
Nicola J. Bidwell, Christopher Lueg, Jeff Axup
ICST
2011
IEEE
12 years 11 months ago
Tailored Shielding and Bypass Testing of Web Applications
User input validation is a technique to counter attacks on web applications. In typical client-server architectures, this validation is performed on the client side. This is ineff...
Tejeddine Mouelhi, Yves Le Traon, Erwan Abgrall, B...