Sciweavers

52 search results - page 8 / 11
» Pattern Rejection
Sort
View
COMSWARE
2007
IEEE
14 years 1 months ago
Competition between SOM Clusters to Model User Authentication System in Computer Networks
—Traditional authentication systems employed on Internet are facing an acute problem of intrusions. In this context we propose a neural architecture for user authentication throu...
Shrijit S. Joshi, Vir V. Phoha
MCS
2007
Springer
14 years 1 months ago
Index Driven Combination of Multiple Biometric Experts for AUC Maximisation
A biometric system produces a matching score representing the degree of similarity of the input with the set of templates for that user. If the score is greater than a prefixed th...
Roberto Tronci, Giorgio Giacinto, Fabio Roli
KDD
2010
ACM
287views Data Mining» more  KDD 2010»
13 years 9 months ago
Designing efficient cascaded classifiers: tradeoff between accuracy and cost
We propose a method to train a cascade of classifiers by simultaneously optimizing all its stages. The approach relies on the idea of optimizing soft cascades. In particular, inst...
Vikas C. Raykar, Balaji Krishnapuram, Shipeng Yu
BIBM
2007
IEEE
133views Bioinformatics» more  BIBM 2007»
13 years 7 months ago
Mining Clinical Data with a Temporal Dimension: A Case Study
Clinical databases store large amounts of information about patients and their medical conditions. Data mining techniques can extract relationships and patterns holding in this we...
Michele Berlingerio, Francesco Bonchi, Fosca Giann...
BMCBI
2010
76views more  BMCBI 2010»
13 years 7 months ago
Validation and characterization of DNA microarray gene expression data distribution and associated moments
Background: The data from DNA microarrays are increasingly being used in order to understand effects of different conditions, exposures or diseases on the modulation of the expres...
Reuben Thomas, Luis de la Torre, Xiaoqing Chang, S...