Sciweavers

756 search results - page 89 / 152
» Decentralized detection and classification using kernel meth...
Sort
View
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
15 years 10 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
KES
2008
Springer
14 years 8 months ago
Classification of Sporadic and BRCA1 Ovarian Cancer Based on a Genome-Wide Study of Copy Number Variations
Abstract. Motivation: Although studies have shown that genetic alterations are causally involved in numerous human diseases, still not much is known about the molecular mechanisms ...
Anneleen Daemen, Olivier Gevaert, Karin Leunen, Va...
TNN
2008
119views more  TNN 2008»
14 years 9 months ago
Selecting Useful Groups of Features in a Connectionist Framework
Abstract--Suppose for a given classification or function approximation (FA) problem data are collected using sensors. From the output of the th sensor, features are extracted, ther...
Debrup Chakraborty, Nikhil R. Pal
TITB
2010
104views Education» more  TITB 2010»
14 years 4 months ago
Time-frequency analysis of accelerometry data for detection of myoclonic seizures
Four time-frequency and time-scale methods are studied for their ability of detecting myoclonic seizures from accelerometric data. Methods that are used are: the short-time Fourier...
Tamara M. E. Nijsen, Ronald M. Aarts, Pierre J. M....
TEC
2002
89views more  TEC 2002»
14 years 9 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta