Sciweavers

132 search results - page 26 / 27
» Motion detection with false discovery rate control
Sort
View
ICC
2007
IEEE
123views Communications» more  ICC 2007»
13 years 11 months ago
Quality of Service in Wireless Network Diversity Multiple Access Protocols Based on a Virtual Time-Slot Allocation
— In this paper, we propose a new resource allocation mechanism which is designed to improve the multiuser detection of wireless network diversity multiple access (NDMA) protocol...
Ramiro Samano-Robles, Mounir Ghogho, Desmond C. Mc...
CCS
2010
ACM
13 years 5 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
NN
2002
Springer
208views Neural Networks» more  NN 2002»
13 years 5 months ago
A spiking neuron model: applications and learning
This paper presents a biologically-inspired, hardware-realisable spiking neuron model, which we call the Temporal Noisy-Leaky Integrator (TNLI). The dynamic applications of the mo...
Chris Christodoulou, Guido Bugmann, Trevor G. Clar...
RECSYS
2009
ACM
13 years 12 months ago
Assessment of conversation co-mentions as a resource for software module recommendation
Conversation double pivots recommend target items related to a source item, based on co-mentions of source and target items in online forums. We deployed several variants on the d...
Daniel Xiaodan Zhou, Paul Resnick
BMCBI
2006
82views more  BMCBI 2006»
13 years 5 months ago
Profiling alternatively spliced mRNA isoforms for prostate cancer classification
Background: Prostate cancer is one of the leading causes of cancer illness and death among men in the United States and world wide. There is an urgent need to discover good biomar...
Chaolin Zhang, Hai-Ri Li, Jian-Bing Fan, Jessica W...