Sciweavers

2180 search results - page 353 / 436
» Algorithms for discovering bucket orders from data
Sort
View
AICCSA
2005
IEEE
105views Hardware» more  AICCSA 2005»
15 years 6 months ago
Multivariate statistical analysis for network attacks detection
Detection and self-protection against viruses, worms, and network attacks is urgently needed to protect network systems and their applications from catastrophic failures. Once a n...
Guangzhi Qu, Salim Hariri, Mazin S. Yousif
104
Voted
CSB
2005
IEEE
143views Bioinformatics» more  CSB 2005»
15 years 6 months ago
Multivariate gene selection: Does it help
When building predictors of disease state based on gene expression data, gene selection is performed in order to achieve a good performance and to identify a relevant subset of ge...
Carmen Lai, Marcel J. T. Reinders
115
Voted
ICIP
2009
IEEE
15 years 7 months ago
A Novel Framework for Imaging Using Compressed Sensing
Recently, there has been growing interest in using compressed sensing to perform imaging. Most of these algorithms capture the image of a scene by taking projections of the imaged ...
Pradeep Sen and Soheil Darabi
117
Voted
IFIP
1989
Springer
15 years 4 months ago
Software Fault Tolerance
The designation “fault tolerant software” has been used for techniques ranging from roll-back and retry to N-version programming, from data mirroring to functional redundancy....
Algirdas Avizienis
102
Voted
APWEB
2006
Springer
15 years 4 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa