Sciweavers

457 search results - page 81 / 92
» A relative trust-region algorithm for independent component ...
Sort
View
RAID
2010
Springer
14 years 8 months ago
Detecting the Onset of Infection for Secure Hosts
Abstract. Software flaws in applications such as a browser may be exploited by attackers to launch drive-by-download (DBD), which has become the major vector of malware infection....
Kui Xu, Qiang Ma, Danfeng (Daphne) Yao
90
Voted
JOCN
2010
123views more  JOCN 2010»
14 years 4 months ago
Human Brain Dynamics Accompanying Use of Egocentric and Allocentric Reference Frames during Navigation
Maintaining spatial orientation while travelling requires integrating spatial information encountered from an egocentric viewpoint with accumulated information represented within ...
Klaus Gramann, Julie Onton, Davide Riccobon, Herma...
69
Voted
KDD
2009
ACM
189views Data Mining» more  KDD 2009»
15 years 4 months ago
CoCo: coding cost for parameter-free outlier detection
How can we automatically spot all outstanding observations in a data set? This question arises in a large variety of applications, e.g. in economy, biology and medicine. Existing ...
Christian Böhm, Katrin Haegler, Nikola S. M&u...
PAMI
2006
186views more  PAMI 2006»
14 years 9 months ago
Performance Evaluation of Fingerprint Verification Systems
This paper is concerned with the performance evaluation of fingerprint verification systems. After an initial classification of biometric testing initiatives, we explore both the t...
Raffaele Cappelli, Dario Maio, Davide Maltoni, Jam...
76
Voted
BMCBI
2004
122views more  BMCBI 2004»
14 years 9 months ago
A comprehensive comparison of comparative RNA structure prediction approaches
Background: An increasing number of researchers have released novel RNA structure analysis and prediction algorithms for comparative approaches to structure prediction. Yet, indep...
Paul P. Gardner, Robert Giegerich