Sciweavers

1787 search results - page 328 / 358
» classification 2006
Sort
View
JGS
2006
113views more  JGS 2006»
13 years 8 months ago
Pattern based map comparisons
Map comparison techniques based on a pixel-by-pixel comparison are useful for many purposes, but fail to reveal important aspects of map similarities and differences. In contrast, ...
Roger White
JIB
2006
106views more  JIB 2006»
13 years 8 months ago
A structural keystone for drug design
3D-structures of proteins and potential ligands are the cornerstones of rational drug design. The first brick to build upon is selecting a protein target and finding out whether b...
Kristian Rother, Mathias Dunkel, Elke Michalsky, S...
JMIV
2006
124views more  JMIV 2006»
13 years 8 months ago
Segmentation of a Vector Field: Dominant Parameter and Shape Optimization
Vector field segmentation methods usually belong to either of three classes: methods which segment regions homogeneous in direction and/or norm, methods which detect discontinuiti...
Tristan Roy, Eric Debreuve, Michel Barlaud, Gilles...
JMLR
2006
148views more  JMLR 2006»
13 years 8 months ago
Computational and Theoretical Analysis of Null Space and Orthogonal Linear Discriminant Analysis
Dimensionality reduction is an important pre-processing step in many applications. Linear discriminant analysis (LDA) is a classical statistical approach for supervised dimensiona...
Jieping Ye, Tao Xiong
JMLR
2006
132views more  JMLR 2006»
13 years 8 months ago
Learning to Detect and Classify Malicious Executables in the Wild
We describe the use of machine learning and data mining to detect and classify malicious executables as they appear in the wild. We gathered 1,971 benign and 1,651 malicious execu...
Jeremy Z. Kolter, Marcus A. Maloof