Sciweavers

1561 search results - page 182 / 313
» Evaluating different methods of microarray data normalizatio...
Sort
View
ICASSP
2011
IEEE
14 years 6 months ago
Maximum a posteriori based regularization parameter selection
The 1 norm regularized least square technique has been proposed as an efficient method to calculate sparse solutions. However, the choice of the regularization parameter is still...
Ashkan Panahi, Mats Viberg
VVS
1996
IEEE
98views Visualization» more  VVS 1996»
15 years 6 months ago
Classification and Local Error Estimation of Interpolation and Derivative Filters for Volume Rendering
We describe a new method for analyzing, classifying, and evaluating filters, which can be applied to interpolation filters, and derivative filters. Our analysis is based on the Ta...
Torsten Möller, Raghu Machiraju, Klaus Muelle...
ICIP
2007
IEEE
15 years 8 months ago
Rotation-Independent IRIS Matching by Motion Estimation
In this paper we propose a novel method of applying motion estimation techniques to human authentication by iris matching. By exploiting the inherent differences in vector fields ...
Donald M. Monro, Soumyadip Rakshit
112
Voted
KBSE
2007
IEEE
15 years 8 months ago
The business case for automated software engineering
Adoption of advanced automated SE (ASE) tools would be favored if a business case could be made that these tools are more valuable than alternate methods. In theory, software pred...
Tim Menzies, Oussama El-Rawas, Jairus Hihn, Martin...
CORR
2010
Springer
149views Education» more  CORR 2010»
15 years 2 months ago
Using Rough Set and Support Vector Machine for Network Intrusion Detection
The main function of IDS (Intrusion Detection System) is to protect the system, analyze and predict the behaviors of users. Then these behaviors will be considered an attack or a ...
Rung Ching Chen, Kai-Fan Cheng, Chia-Fen Hsieh