Sciweavers

4018 search results - page 714 / 804
» Process algebra for performance evaluation
Sort
View
135
Voted
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 4 months ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
TEC
2008
104views more  TEC 2008»
15 years 4 months ago
Genetic-Fuzzy Data Mining With Divide-and-Conquer Strategy
Data mining is most commonly used in attempts to induce association rules from transaction data. Most previous studies focused on binary-valued transaction data. Transaction data i...
Tzung-Pei Hong, Chun-Hao Chen, Yeong-Chyi Lee, Yu-...
TIFS
2008
129views more  TIFS 2008»
15 years 4 months ago
On Empirical Recognition Capacity of Biometric Systems Under Global PCA and ICA Encoding
Performance of biometric-based recognition systems depends on various factors: database quality, image preprocessing, encoding techniques, etc. Given a biometric database and a se...
Natalia A. Schmid, Francesco Nicolo
164
Voted
BMCBI
2005
163views more  BMCBI 2005»
15 years 4 months ago
Rank-invariant resampling based estimation of false discovery rate for analysis of small sample microarray data
Background: The evaluation of statistical significance has become a critical process in identifying differentially expressed genes in microarray studies. Classical p-value adjustm...
Nitin Jain, HyungJun Cho, Michael O'Connell, Jae K...
BMCBI
2005
121views more  BMCBI 2005»
15 years 4 months ago
Automated methods of predicting the function of biological sequences using GO and BLAST
Background: With the exponential increase in genomic sequence data there is a need to develop automated approaches to deducing the biological functions of novel sequences with hig...
Craig E. Jones, Ute Baumann, Alfred L. Brown