Sciweavers

2682 search results - page 522 / 537
» TCP rate control
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICASSP
2010
IEEE
13 years 7 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
BMCBI
2010
126views more  BMCBI 2010»
13 years 7 months ago
A boosting method for maximizing the partial area under the ROC curve
Background: The receiver operating characteristic (ROC) curve is a fundamental tool to assess the discriminant performance for not only a single marker but also a score function c...
Osamu Komori, Shinto Eguchi
BMCBI
2008
128views more  BMCBI 2008»
13 years 7 months ago
Nonparametric relevance-shifted multiple testing procedures for the analysis of high-dimensional multivariate data with small sa
Background: In many research areas it is necessary to find differences between treatment groups with several variables. For example, studies of microarray data seek to find a sign...
Cornelia Frömke, Ludwig A. Hothorn, Siegfried...
BMCBI
2007
104views more  BMCBI 2007»
13 years 7 months ago
Predicting active site residue annotations in the Pfam database
Background: Approximately 5% of Pfam families are enzymatic, but only a small fraction of the sequences within these families (<0.5%) have had the residues responsible for cata...
Jaina Mistry, Alex Bateman, Robert D. Finn