Sciweavers

88 search results - page 10 / 18
» Detecting model inconsistency through operation-based model ...
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 6 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton
BMCBI
2007
138views more  BMCBI 2007»
14 years 11 months ago
A systematic approach to detecting transcription factors in response to environmental stresses
Background: Eukaryotic cells have developed mechanisms to respond to external environmental or physiological changes (stresses). In order to increase the activities of stress-prot...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...
ICCCN
2008
IEEE
15 years 6 months ago
TRACK: A Novel Connected Dominating Set based Sink Mobility Model for WSNs
—The core functionality of a wireless sensor network (WSN) is to detect deviations in expected normal behavior and report it to the sink. In this paper, we propose TRACK — a no...
Avinash Srinivasan, Jie Wu
ICDCS
1995
IEEE
15 years 3 months ago
Specifying Weak Sets
nt formal speci cations of a new abstraction, weak sets, which can be used to alleviate high latencies when retrieving data from a wide-area information system like the World Wide...
Jeannette M. Wing, David C. Steere
MICCAI
2010
Springer
14 years 10 months ago
Incorporating Priors on Expert Performance Parameters for Segmentation Validation and Label Fusion: A Maximum a Posteriori STAPL
Abstract. In order to evaluate the quality of segmentations of an image and assess intra- and inter-expert variability in segmentation performance, an Expectation Maximization (EM)...
Olivier Commowick, Simon K. Warfield