Sciweavers

756 search results - page 130 / 152
» Decentralized detection and classification using kernel meth...
Sort
View
MCS
2010
Springer
14 years 11 months ago
Multiple Classifier Systems under Attack
Abstract. In adversarial classification tasks like spam filtering, intrusion detection in computer networks and biometric authentication, a pattern recognition system must not only...
Battista Biggio, Giorgio Fumera, Fabio Roli
87
Voted
ISMB
1993
14 years 11 months ago
Computationally Efficient Cluster Representation in Molecular Sequence Megaclassification
Molecular sequence megaclassification is a technique for automated protein sequence analysis and annotation. Implementation of the method has been limited by the need to store and...
David J. States, Nomi L. Harris, Lawrence Hunter
CCS
2005
ACM
15 years 3 months ago
Automatic diagnosis and response to memory corruption vulnerabilities
Cyber attacks against networked computers have become relentless in recent years. The most common attack method is to exploit memory corruption vulnerabilities such as buffer ove...
Jun Xu, Peng Ning, Chongkyung Kil, Yan Zhai, Chris...
BMCBI
2006
165views more  BMCBI 2006»
14 years 9 months ago
A stable gene selection in microarray data analysis
Background: Microarray data analysis is notorious for involving a huge number of genes compared to a relatively small number of samples. Gene selection is to detect the most signi...
Kun Yang, Zhipeng Cai, Jianzhong Li, Guohui Lin
BMCBI
2007
116views more  BMCBI 2007»
14 years 9 months ago
Ranked Adjusted Rand: integrating distance and partition information in a measure of clustering agreement
Background: Biological information is commonly used to cluster or classify entities of interest such as genes, conditions, species or samples. However, different sources of data c...
Francisco R. Pinto, João A. Carriço,...