Sciweavers

17688 search results - page 3481 / 3538
» Data Set Balancing
Sort
View
CORR
2008
Springer
98views Education» more  CORR 2008»
15 years 2 months ago
An Information-Theoretical View of Network-Aware Malware Attacks
This work investigates three aspects: (a) a network vulnerability as the non-uniform vulnerable-host distribution, (b) threats, i.e., intelligent malwares that exploit such a vulne...
Zesheng Chen, Chuanyi Ji
CORR
2010
Springer
210views Education» more  CORR 2010»
15 years 2 months ago
Exploiting Statistical Dependencies in Sparse Representations for Signal Recovery
Signal modeling lies at the core of numerous signal and image processing applications. A recent approach that has drawn considerable attention is sparse representation modeling, in...
Tomer Faktor, Yonina C. Eldar, Michael Elad
DB
2008
73views more  DB 2008»
15 years 2 months ago
Environmental influences on gender in the IT workforce
In an effort to better understand the underrepresentation of women within the IT profession, one promising line of investigation is the influence of factors in the socio-cultural ...
Eileen M. Trauth, Jeria L. Quesenberry, Benjamin Y...
EJIS
2010
52views more  EJIS 2010»
15 years 2 months ago
Same technology, different outcome? Reinterpreting Barley's Technology as an Occasion for Structuring
In the last few decades, several studies have found the same technology implemented in highly similar organizational settings to be associated with very different consequences for...
Starling David Hunter III
ALMOB
2006
155views more  ALMOB 2006»
15 years 2 months ago
A phylogenetic generalized hidden Markov model for predicting alternatively spliced exons
Background: An important challenge in eukaryotic gene prediction is accurate identification of alternatively spliced exons. Functional transcripts can go undetected in gene expres...
Jonathan E. Allen, Steven L. Salzberg
« Prev « First page 3481 / 3538 Last » Next »