Sciweavers

153 search results - page 10 / 31
» Properties of Signature Change Patterns
Sort
View
BC
2008
89views more  BC 2008»
13 years 8 months ago
Complex evolution of spike patterns during burst propagation through feed-forward networks
Abstract Stable signal transmission is crucial for information processing by the brain. Synfire-chains, defined as feedforward networks of spiking neurons, are a well-studied class...
Jun-nosuke Teramae, Tomoki Fukai
CIC
2004
13 years 10 months ago
On the Analysis of Packet-Train Probing Schemes
With a better understanding of how probe packets and cross-traffic packets interact with each other, more accurate measurement methods based on active probing can be developed. Sev...
Andreas Johnsson, Bob Melander, Mats Björkman
NAACL
2007
13 years 10 months ago
Are Some Speech Recognition Errors Easier to Detect than Others?
This study investigates whether some speech recognition (SR) errors are easier to detect and what patterns can be identified from those errors. Specifically, SR errors were exam...
Yongmei Shi, Lina Zhou
ACSAC
2007
IEEE
14 years 3 months ago
MetaAware: Identifying Metamorphic Malware
Detection of malicious software (malware) by the use of static signatures is often criticized for being overly simplistic. Available methods of obfuscating code (so-called metamor...
Qinghua Zhang, Douglas S. Reeves
BMCBI
2008
108views more  BMCBI 2008»
13 years 8 months ago
Empirical methods for controlling false positives and estimating confidence in ChIP-Seq peaks
Background: High throughput signature sequencing holds many promises, one of which is the ready identification of in vivo transcription factor binding sites, histone modifications...
David A. Nix, Samir J. Courdy, Kenneth M. Boucher