Sciweavers

923 search results - page 170 / 185
» Spam Deobfuscation using a Hidden Markov Model
Sort
View
KDD
2006
ACM
134views Data Mining» more  KDD 2006»
14 years 8 months ago
Learning to rank networked entities
Several algorithms have been proposed to learn to rank entities modeled as feature vectors, based on relevance feedback. However, these algorithms do not model network connections...
Alekh Agarwal, Soumen Chakrabarti, Sunny Aggarwal
BMCBI
2004
114views more  BMCBI 2004»
13 years 7 months ago
HMM Logos for visualization of protein families
Background: Profile Hidden Markov Models (pHMMs) are a widely used tool for protein family research. Up to now, however, there exists no method to visualize all of their central a...
Benjamin Schuster-Böckler, Jörg Schultz,...
ISI
2008
Springer
13 years 7 months ago
Real time intrusion prediction, detection and prevention programs
An Intrusion Detection Program (IDP) analyzes what happens or has happened during an execution and tries to find indications that the computer has been misused. In this talk, we p...
A. Abraham
SENSYS
2010
ACM
13 years 5 months ago
AutoWitness: locating and tracking stolen property while tolerating GPS and radio outages
We present AutoWitness, a system to deter, detect, and track personal property theft, improve historically dismal stolen property recovery rates, and disrupt stolen property distr...
Santanu Guha, Kurt Plarre, Daniel Lissner, Somnath...
RECOMB
2002
Springer
14 years 8 months ago
Combining pairwise sequence similarity and support vector machines for remote protein homology detection
One key element in understanding the molecular machinery of the cell is to understand the meaning, or function, of each protein encoded in the genome. A very successful means of i...
Li Liao, William Stafford Noble