Sciweavers

2620 search results - page 523 / 524
» An Evaluation Technique for Binarization Algorithms
Sort
View
BMCBI
2007
166views more  BMCBI 2007»
13 years 6 months ago
How to decide which are the most pertinent overly-represented features during gene set enrichment analysis
Background: The search for enriched features has become widely used to characterize a set of genes or proteins. A key aspect of this technique is its ability to identify correlati...
Roland Barriot, David J. Sherman, Isabelle Dutour
BMCBI
2007
149views more  BMCBI 2007»
13 years 6 months ago
Robust imputation method for missing values in microarray data
Background: When analyzing microarray gene expression data, missing values are often encountered. Most multivariate statistical methods proposed for microarray data analysis canno...
Dankyu Yoon, Eun-Kyung Lee, Taesung Park
TROB
2008
93views more  TROB 2008»
13 years 6 months ago
Using Sensor Morphology for Multirobot Formations
In formation-maintenance (formation control) tasks, robots maintain their relative position with respect to their peers, according to a desired geometric shape. Previous work has e...
Gal A. Kaminka, Ruti Schechter-Glick, Vladimir Sad...
TMI
2010
172views more  TMI 2010»
13 years 4 months ago
Comparison of AdaBoost and Support Vector Machines for Detecting Alzheimer's Disease Through Automated Hippocampal Segmentation
Abstract— We compared four automated methods for hippocampal segmentation using different machine learning algorithms (1) hierarchical AdaBoost, (2) Support Vector Machines (SVM)...
Jonathan H. Morra, Zhuowen Tu, Liana G. Apostolova...
FDTC
2010
Springer
132views Cryptology» more  FDTC 2010»
13 years 4 months ago
Fault Injection Resilience
Fault injections constitute a major threat to the security of embedded systems. The errors in the cryptographic algorithms have been shown to be extremely dangerous, since powerful...
Sylvain Guilley, Laurent Sauvage, Jean-Luc Danger,...