Sciweavers

4903 search results - page 804 / 981
» The Set Covering Machine
Sort
View
ISBI
2009
IEEE
14 years 4 months ago
Quantitative Comparison of Spot Detection Methods in Live-Cell Fluorescence Microscopy Imaging
In live-cell fluorescence microscopy imaging, quantitative analysis of biological image data generally involves the detection of many subresolution objects, appearing as diffract...
Ihor Smal, Marco Loog, Wiro J. Niessen, Erik H. W....
CCS
2009
ACM
14 years 4 months ago
Physically restricted authentication with trusted hardware
Modern computer systems permit users to access protected information from remote locations. In certain secure environments, it would be desirable to restrict this access to a part...
Michael S. Kirkpatrick, Elisa Bertino
FASE
2009
Springer
14 years 4 months ago
Reducing the Costs of Bounded-Exhaustive Testing
Abstract. Bounded-exhaustive testing is an automated testing methodology that checks the code under test for all inputs within given bounds: first the user describes a set of test...
Vilas Jagannath, Yun Young Lee, Brett Daniel, Dark...
CSIE
2009
IEEE
14 years 4 months ago
Building a General Purpose Cross-Domain Sentiment Mining Model
Building a model using machine learning that can classify the sentiment of natural language text often requires an extensive set of labeled training data from the same domain as t...
Matthew Whitehead, Larry Yaeger
DSD
2009
IEEE
95views Hardware» more  DSD 2009»
14 years 4 months ago
The Parallel Sieve Method for a Virus Scanning Engine
This paper shows a new architecture for a virus scanning system, which is different from that of an intrusion detection system. The proposed method uses two-stage matching: In the...
Hiroki Nakahara, Tsutomu Sasao, Munehiro Matsuura,...