Sciweavers

6574 search results - page 81 / 1315
» Current Signatures: Application
Sort
View
108
Voted
ICDAR
2003
IEEE
15 years 6 months ago
Recognition of Arrows in Line Drawings based on the Aggregation of Geometric Criteria using the Choquet Integral
A new way to detect arrows in line drawings is proposed in this paper. Our approach is based on the definition of the structure of such a symbol. Signatures of angular areas are ...
Laurent Wendling, Salvatore Tabbone
123
Voted
KBSE
2005
IEEE
15 years 6 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
96
Voted
BMCBI
2005
90views more  BMCBI 2005»
15 years 19 days ago
An algorithm for the determination and quantification of components of nucleic acid mixtures based on single sequencing reaction
Background: Determination and quantification of nucleic acid components in a mixture is usually accomplished by microarray approaches, where the mixtures are hybridized against sp...
Alexander E. Pozhitkov, Kathryn Stemshorn, Diethar...
125
Voted
BMCBI
2011
14 years 4 months ago
Wavelet-based identification of DNA focal genomic aberrations from single nucleotide polymorphism arrays
Background: Copy number aberrations (CNAs) are an important molecular signature in cancer initiation, development, and progression. However, these aberrations span a wide range of...
Youngmi Hur, Hyunju Lee
PAM
2007
Springer
15 years 6 months ago
Early Recognition of Encrypted Applications
Abstract. Most tools to recognize the application associated with network connections use well-known signatures as basis for their classification. This approach is very effective ...
Laurent Bernaille, Renata Teixeira