Sciweavers

988 search results - page 26 / 198
» Positive Results and Techniques for Obfuscation
Sort
View
BMCBI
2010
119views more  BMCBI 2010»
13 years 9 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...
WWW
2004
ACM
14 years 9 months ago
Dealing with different distributions in learning from
In the problem of learning with positive and unlabeled examples, existing research all assumes that positive examples P and the hidden positive examples in the unlabeled set U are...
Xiaoli Li, Bing Liu
CEAS
2008
Springer
13 years 10 months ago
A Mail Client Plugin for Privacy-Preserving Spam Filter Evaluation
We describe a plugin extension to the Thunderbird Mail Client to support standardized evaluation of multiple spam filters on private mail streams. Researchers need not view or han...
Mona Mojdeh, Gordon V. Cormack
VIROLOGY
2008
104views more  VIROLOGY 2008»
13 years 8 months ago
Malware behaviour analysis
Several malware analysis techniques suppose that the disassembled code of a piece of malware is available, which is however not always possible. This paper proposes a flexible and ...
Gérard Wagener, Radu State, Alexandre Dulau...
UIST
2003
ACM
14 years 2 months ago
VisionWand: interaction techniques for large displays using a passive wand tracked in 3D
A passive wand tracked in 3D using computer vision techniques is explored as a new input mechanism for interacting with large displays. We demonstrate a variety of interaction tec...
Xiang Cao, Ravin Balakrishnan