Sciweavers

4498 search results - page 895 / 900
» The Power of Data
Sort
View
JAIR
2010
181views more  JAIR 2010»
13 years 1 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
JOCN
2010
123views more  JOCN 2010»
13 years 1 months ago
Human Brain Dynamics Accompanying Use of Egocentric and Allocentric Reference Frames during Navigation
Maintaining spatial orientation while travelling requires integrating spatial information encountered from an egocentric viewpoint with accumulated information represented within ...
Klaus Gramann, Julie Onton, Davide Riccobon, Herma...
NAR
2010
148views more  NAR 2010»
13 years 1 months ago
SIMAP - a comprehensive database of pre-calculated protein sequence similarities, domains, annotations and clusters
The prediction of protein function as well as the reconstruction of evolutionary genesis employing sequence comparison at large is still the most powerful tool in sequence analysi...
Thomas Rattei, Patrick Tischler, Stefan Götz,...
TASLP
2010
134views more  TASLP 2010»
13 years 1 months ago
Multiple Fundamental Frequency Estimation by Modeling Spectral Peaks and Non-Peak Regions
This paper presents a maximum likelihood approach to multiple fundamental frequency (F0) estimation for a mixture of harmonic sound sources, where the power spectrum of a time fra...
Zhiyao Duan, Bryan Pardo, Changshui Zhang
TIP
2010
107views more  TIP 2010»
13 years 1 months ago
Risk-Distortion Analysis for Video Collusion Attacks: A Mouse-and-Cat Game
Copyright protection is a key issue for video sharing over public networks. To protect the video content from unauthorized redistribution, digital fingerprinting is commonly used. ...
Yan Chen, W. Sabrina Lin, K. J. Ray Liu