Sciweavers

140 search results - page 9 / 28
» A comparative study of two network-based anomaly detection m...
Sort
View
GECCO
2010
Springer
196views Optimization» more  GECCO 2010»
15 years 2 months ago
Using synthetic test suites to empirically compare search-based and greedy prioritizers
The increase in the complexity of modern software has led to the commensurate growth in the size and execution time of the test suites for these programs. In order to address this...
Zachary D. Williams, Gregory M. Kapfhammer
ICPR
2006
IEEE
15 years 10 months ago
An Experimental Study on Automatic Face Gender Classification
This paper presents an experimental study on automatic face gender classification by building a system that mainly consists of four parts, face detection, face alignment, texture ...
Haizhou Ai, Ming Li, Zhiguang Yang
ACSAC
2008
IEEE
15 years 4 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
152
Voted
BMCBI
2005
306views more  BMCBI 2005»
14 years 9 months ago
A method for aligning RNA secondary structures and its application to RNA motif detection
Background: Alignment of RNA secondary structures is important in studying functional RNA motifs. In recent years, much progress has been made in RNA motif finding and structure a...
Jianghui Liu, Jason Tsong-Li Wang, Jun Hu, Bin Tia...
ICPR
2000
IEEE
15 years 1 months ago
Automatic Left Ventricular Endocardium Detection in Echocardiograms Based on Ternary Thresholding Method
Methods for automatic detection of left ventricular endocardium in echocardiograms are required to quantitatively evaluate the functional performance of the left ventricle. This s...
Wataru Ohyama, Tetsushi Wakabayashi, Fumitaka Kimu...