Sciweavers

3128 search results - page 476 / 626
» Finite element method
Sort
View
JAIR
2010
181views more  JAIR 2010»
14 years 11 months ago
Intrusion Detection using Continuous Time Bayesian Networks
Intrusion detection systems (IDSs) fall into two high-level categories: network-based systems (NIDS) that monitor network behaviors, and host-based systems (HIDS) that monitor sys...
Jing Xu, Christian R. Shelton

Publication
151views
14 years 3 months ago
Embedding Overlap Priors in Variational Left Ventricle Tracking
Tracking heart motion plays an essential role in the diagnosis of cardiovascular diseases. This study investigates overlap priors for variational tracking of the Left Ventricle (LV...
Ismail Ben Ayed, Shuo Li and Ian Ross
ICDM
2008
IEEE
137views Data Mining» more  ICDM 2008»
15 years 11 months ago
Stream Sequential Pattern Mining with Precise Error Bounds
Sequential pattern mining is an interesting data mining problem with many real-world applications. This problem has been studied extensively in static databases. However, in recen...
Luiz F. Mendes, Bolin Ding, Jiawei Han
ICASSP
2007
IEEE
15 years 11 months ago
Protein Fold Recognition using Residue-Based Alignments of Sequence and Secondary Structure
Protein structure prediction aims to determine the three-dimensional structure of proteins form their amino acid sequences. When a protein does not have similarity (homology) to a...
Zafer Aydin, Hakan Erdogan, Yucel Altunbasak
BMCBI
2008
107views more  BMCBI 2008»
15 years 4 months ago
Probe-specific mixed-model approach to detect copy number differences using multiplex ligation-dependent probe amplification (ML
Background: MLPA method is a potentially useful semi-quantitative method to detect copy number alterations in targeted regions. In this paper, we propose a method for the normaliz...
Juan R. González, Josep L. Carrasco, Llu&ia...