Sciweavers

2279 search results - page 260 / 456
» Robust Circle Detection
Sort
View
147
Voted
NDSS
2000
IEEE
15 years 8 months ago
User-Level Infrastructure for System Call Interposition: A Platform for Intrusion Detection and Confinement
Several new approaches for detecting malicious attacks on computer systems and/or confining untrusted or malicious applications have emerged over the past several years. These tec...
K. Jain, R. Sekar
157
Voted
BMCBI
2010
135views more  BMCBI 2010»
15 years 4 months ago
Detecting disease associated modules and prioritizing active genes based on high throughput data
Background: The accumulation of high-throughput data greatly promotes computational investigation of gene function in the context of complex biological systems. However, a biologi...
Yu-Qing Qiu, Shi-Hua Zhang, Xiang-Sun Zhang, Luona...
129
Voted
BMCBI
2010
150views more  BMCBI 2010»
15 years 4 months ago
MCL-CAw: a refinement of MCL for detecting yeast complexes from weighted PPI networks by incorporating core-attachment structure
Background: The reconstruction of protein complexes from the physical interactome of organisms serves as a building block towards understanding the higher level organization of th...
Sriganesh Srihari, Kang Ning, Hon Wai Leong
MIS
2008
Springer
149views Multimedia» more  MIS 2008»
15 years 4 months ago
Home-Explorer: Ontology-based physical artifact search and hidden object detection system
A new system named Home-Explorer that searches and finds physical artifacts in a smart indoor environment is proposed. The view on which it is based is artifact-centered and uses s...
Bin Guo, Satoru Satake, Michita Imai
RAS
2007
132views more  RAS 2007»
15 years 4 months ago
Virtual sensors for human concepts - Building detection by an outdoor mobile robot
Abstract— In human-robot communication it is often important to relate robot sensor readings to concepts used by humans. We suggest to use a virtual sensor (one or several physic...
Martin Persson, Tom Duckett, Achim J. Lilienthal