Sciweavers

140 search results - page 15 / 28
» A comparative study of two network-based anomaly detection m...
Sort
View
103
Voted
IJVR
2007
72views more  IJVR 2007»
14 years 9 months ago
MACBETH: Management of Avatar Conflict by Employment of a Technique Hybrid
—When a virtual environment system prevents a user’s avatar hand from penetrating virtual objects, the seen and felt positions of the hand separate. We propose a new method for...
Eric Burns, Sharif Razzaque, Mary C. Whitton, Fred...
89
Voted
BMCBI
2007
174views more  BMCBI 2007»
14 years 9 months ago
Normalization method for metabolomics data using optimal selection of multiple internal standards
Background: Success of metabolomics as the phenotyping platform largely depends on its ability to detect various sources of biological variability. Removal of platform-specific so...
Marko Sysi-Aho, Mikko Katajamaa, Laxman Yetukuri, ...
78
Voted
BMCBI
2010
156views more  BMCBI 2010»
14 years 9 months ago
Evaluation of statistical methods for normalization and differential expression in mRNA-Seq experiments
Background: High-throughput sequencing technologies, such as the Illumina Genome Analyzer, are powerful new tools for investigating a wide range of biological and medical question...
James H. Bullard, Elizabeth Purdom, Kasper D. Hans...
ASWEC
2007
IEEE
15 years 1 months ago
Managing Conflicts When Using Combination Strategies to Test Software
Testers often represent systems under test in input parameter models. These contain parameters with associated values. Combinations of parameter values, with one value for each pa...
Mats Grindal, Jeff Offutt, Jonas Mellin
CORR
2011
Springer
184views Education» more  CORR 2011»
14 years 4 months ago
Metamorphic Virus Variants Classification Using Opcode Frequency Histogram
Abstract- In order to prevent detection and evade signature-based scanning methods, which are normally exploited by antivirus softwares, metamorphic viruses use several various obf...
Babak Bashari Rad, Maslin Masrom