Sciweavers

2748 search results - page 499 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
BMCBI
2004
169views more  BMCBI 2004»
14 years 11 months ago
A power law global error model for the identification of differentially expressed genes in microarray data
Background: High-density oligonucleotide microarray technology enables the discovery of genes that are transcriptionally modulated in different biological samples due to physiolog...
Norman Pavelka, Mattia Pelizzola, Caterina Vizzard...
JASIS
1998
172views more  JASIS 1998»
14 years 11 months ago
Speech Recognition for a Digital Video Library
The standard method for making the full content of audio and video material searchable and is to annotate it with humangenerated meta-data that describes the content in a way that...
Michael J. Witbrock, Alexander G. Hauptmann
TJS
2010
182views more  TJS 2010»
14 years 10 months ago
A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning
This paper presents a novel host-based combinatorial method based on k-Means clustering and ID3 decision tree learning algorithms for unsupervised classification of anomalous and ...
Yasser Yasami, Saadat Pour Mozaffari
DIALM
2010
ACM
194views Algorithms» more  DIALM 2010»
14 years 9 months ago
Prioritized gossip in vehicular networks
We present a method for using real world mobility traces to identify tractable theoretical models for the study of distributed algorithms in mobile networks. We validate the metho...
Alejandro Cornejo, Calvin C. Newport
CCS
2006
ACM
15 years 3 months ago
Measuring denial Of service
Denial-of-service (DoS) attacks significantly degrade service quality experienced by legitimate users by introducing long delays, excessive losses, and service interruptions. The ...
Jelena Mirkovic, Peter L. Reiher, Sonia Fahmy, Ros...