Sciweavers

88 search results - page 17 / 18
» Bayesian Network Based Reparameterization of Haar-like Featu...
Sort
View
ACSAC
2006
IEEE
15 years 3 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu
BMCBI
2007
114views more  BMCBI 2007»
14 years 9 months ago
Large scale statistical inference of signaling pathways from RNAi and microarray data
Background: The advent of RNA interference techniques enables the selective silencing of biologically interesting genes in an efficient way. In combination with DNA microarray tec...
Holger Fröhlich, Mark Fellmann, Holger Sü...
BMCBI
2008
107views more  BMCBI 2008»
14 years 9 months ago
A machine learning approach to explore the spectra intensity pattern of peptides using tandem mass spectrometry data
Background: A better understanding of the mechanisms involved in gas-phase fragmentation of peptides is essential for the development of more reliable algorithms for high-throughp...
Cong Zhou, Lucas D. Bowler, Jianfeng Feng
PE
2010
Springer
140views Optimization» more  PE 2010»
14 years 8 months ago
KPC-Toolbox: Best recipes for automatic trace fitting using Markovian Arrival Processes
We present the KPC-Toolbox, a library of MATLAB scripts for fitting workload traces into Markovian Arrival Processes (MAPs) in an automatic way based on the recently proposed Kro...
Giuliano Casale, Eddy Z. Zhang, Evgenia Smirni
TASLP
2011
14 years 4 months ago
A Generative Student Model for Scoring Word Reading Skills
—This paper presents a novel student model intended to automate word-list-based reading assessments in a classroom setting, specifically for a student population that includes b...
Joseph Tepperman, Sungbok Lee, Shrikanth Narayanan...