Sciweavers

1548 search results - page 140 / 310
» Estimating Software Vulnerabilities
Sort
View
BMCBI
2008
108views more  BMCBI 2008»
14 years 11 months ago
Empirical methods for controlling false positives and estimating confidence in ChIP-Seq peaks
Background: High throughput signature sequencing holds many promises, one of which is the ready identification of in vivo transcription factor binding sites, histone modifications...
David A. Nix, Samir J. Courdy, Kenneth M. Boucher
CVPR
2004
IEEE
16 years 1 months ago
Multi-Scale Visual Tracking by Sequential Belief Propagation
A novel statistical method is proposed in this paper to overcome abrupt motion for robust visual tracking. Existing tracking methods that are based on the small motion assumption ...
Gang Hua, Ying Wu
ICPR
2006
IEEE
16 years 18 days ago
Combining Generative and Discriminative Methods for Pixel Classification with Multi-Conditional Learning
It is possible to broadly characterize two approaches to probabilistic modeling in terms of generative and discriminative methods. Provided with sufficient training data the discr...
B. Michael Kelm, Chris Pal, Andrew McCallum
DSN
2007
IEEE
15 years 5 months ago
Architecture-Level Soft Error Analysis: Examining the Limits of Common Assumptions
This paper concerns the validity of a widely used method for estimating the architecture-level mean time to failure (MTTF) due to soft errors. The method first calculates the fai...
Xiaodong Li, Sarita V. Adve, Pradip Bose, Jude A. ...
ATAL
2007
Springer
15 years 5 months ago
An incentive mechanism for message relaying in unstructured peer-to-peer systems
Distributed message relaying is an important function of a peer-topeer system to discover service providers. Existing search protocols in unstructured peer-to-peer systems either ...
Cuihong Li, Bin Yu, Katia P. Sycara