Sciweavers

3273 search results - page 518 / 655
» types 2007
Sort
View
BIBE
2007
IEEE
136views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
A Two-Stage Gene Selection Algorithm by Combining ReliefF and mRMR
Abstract—Gene expression data usually contains a large number of genes, but a small number of samples. Feature selection for gene expression data aims at finding a set of genes ...
Yi Zhang, Chris H. Q. Ding, Tao Li
140
Voted
BIBE
2007
IEEE
126views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
An End-to-End Process for Cancer Identification from Images of Lung Tissue
— This research describes a non-interactive process that applies several forms of computational intelligence to the task of classifying biopsy lung tissue samples based on visual...
Walker H. Land Jr., Daniel W. McKee, Tatyana Zhuko...
CONEXT
2007
ACM
15 years 6 months ago
Detecting worm variants using machine learning
Network intrusion detection systems typically detect worms by examining packet or flow logs for known signatures. Not only does this approach mean worms cannot be detected until ...
Oliver Sharma, Mark Girolami, Joseph S. Sventek
ECLIPSE
2007
ACM
15 years 6 months ago
CReN: a tool for tracking copy-and-paste code clones and renaming identifiers consistently in the IDE
Programmers often copy and paste code so that they can reuse the existing code to complete a similar task. Many times, modifications to the newly pasted code include renaming all ...
Patricia Jablonski, Daqing Hou
165
Voted
FGCN
2007
IEEE
173views Communications» more  FGCN 2007»
15 years 6 months ago
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation
A black hole attack is a severe attack that can be easily employed against routing in mobile ad hoc networks. A black hole is a malicious node that falsely replies for any route r...
Hesiri Weerasinghe, Huirong Fu