Sciweavers

1031 search results - page 203 / 207
» Bayesian Information Extraction Network
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
15 years 6 months ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
IWANN
2009
Springer
15 years 6 months ago
Identifying Gene Ontology Areas for Automated Enrichment
Biomedical ontologies provide a commonly accepted scheme for the characterization of biological concepts that enable knowledge sharing and integration. Updating and maintaining an ...
Catia Pesquita, Tiago Grego, Francisco M. Couto
90
Voted
ICC
2008
IEEE
132views Communications» more  ICC 2008»
15 years 6 months ago
Contourlet Based Image Compression for Wireless Communication in Face Recognition System
—This paper proposes to use Contourlet transform for image compression and feature extraction for wireless face recognition system. The properties of face images and face recogni...
Yanjun Yan, Rajani Muraleedharan, Xiang Ye, Lisa A...
ICPP
2008
IEEE
15 years 6 months ago
Machine Learning Models to Predict Performance of Computer System Design Alternatives
Computer manufacturers spend a huge amount of time, resources, and money in designing new systems and newer configurations, and their ability to reduce costs, charge competitive p...
Berkin Özisikyilmaz, Gokhan Memik, Alok N. Ch...
PREMI
2005
Springer
15 years 5 months ago
Computational Molecular Biology of Genome Expression and Regulation
Abstract. Technological advances in experimental and computational molecular biology have revolutionized the whole fields of biology and medicine. Large-scale sequencing, expressio...
Michael Q. Zhang