Sciweavers

4127 search results - page 804 / 826
» Evaluation methods for topic models
Sort
View
CSREASAM
2006
14 years 11 months ago
Reinforcing Access Control Using Fuzzy Relation Equations
Current computer security systems are based on the premise that once a user presents valid credentials to the authentication system (e.g. valid ID and password), they are granted ...
Ali Berrached, André de Korvin
BMCBI
2007
172views more  BMCBI 2007»
14 years 10 months ago
msBayes: Pipeline for testing comparative phylogeographic histories using hierarchical approximate Bayesian computation
Background: Although testing for simultaneous divergence (vicariance) across different population-pairs that span the same barrier to gene flow is of central importance to evoluti...
Michael J. Hickerson, Eli Stahl, Naoki Takebayashi
BMCBI
2007
113views more  BMCBI 2007»
14 years 9 months ago
Statistical power of phylo-HMM for evolutionarily conserved element detection
Background: An important goal of comparative genomics is the identification of functional elements through conservation analysis. Phylo-HMM was recently introduced to detect conse...
Xiaodan Fan, Jun Zhu, Eric E. Schadt, Jun S. Liu
CN
2007
91views more  CN 2007»
14 years 9 months ago
Improving the quality of alerts and predicting intruder's next goal with Hidden Colored Petri-Net
Intrusion detection systems (IDS) often provide poor quality alerts, which are insufficient to support rapid identification of ongoing attacks or predict an intruder’s next lik...
Dong Yu, Deborah A. Frincke
PR
2007
149views more  PR 2007»
14 years 9 months ago
Real-time detection of steam in video images
In this paper, we present a real-time image processing technique for the detection of steam in video images. The assumption made is that the presence of steam acts as a blurring p...
Ricardo J. Ferrari, H. Zhang, C. R. Kube