Sciweavers

1523 search results - page 132 / 305
» Detecting and Sketching the Common
Sort
View
BMCBI
2010
119views more  BMCBI 2010»
14 years 10 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...
MICCAI
2003
Springer
15 years 11 months ago
Computed Cleansing for Virtual Colonoscopy Using a Three-Material Transition Model
Virtual colonoscopy is a non-invasive technique for the detection of polyps. Currently, a clean colon is required; as without cleansing the colonic wall cannot be segmented. Enhanc...
Iwo Serlie, Roel Truyen, Jasper Florie, Frits H. P...
SIGSOFT
2002
ACM
15 years 10 months ago
Using redundancies to find errors
This paper explores the idea that redundant operations, like type errors, commonly flag correctness errors. We experimentally test this idea by writing and applying four redundanc...
Yichen Xie, Dawson R. Engler
KDD
2001
ACM
1203views Data Mining» more  KDD 2001»
15 years 10 months ago
Application of Data Mining Techniques for Medical Image Classification
Breast cancer represents the second leading cause of cancer deaths in women today and it is the most common type of cancer in women. This paper presents some experiments for tumou...
Maria-Luiza Antonie, Osmar R. Zaïane, Alexand...
DSOM
2009
Springer
15 years 4 months ago
Hidden Markov Model Modeling of SSH Brute-Force Attacks
Abstract. Nowadays, network load is constantly increasing and high-speed infrastructures (1-10Gbps) are becoming increasingly common. In this context, flow-based intrusion detecti...
Anna Sperotto, Ramin Sadre, Pieter-Tjerk de Boer, ...