Sciweavers

1068 search results - page 196 / 214
» Group Dominant Strategies
Sort
View
94
Voted
FLAIRS
2007
14 years 12 months ago
Low-Effort Labeling of Network Events for Intrusion Detection in WLANs
A low-effort data mining approach to labeling network event records in a WLAN is proposed. The problem being addressed is often observed in an AI and data mining strategy to netwo...
Taghi M. Khoshgoftaar, Chris Seiffert, Naeem Seliy...
MVA
1990
170views Computer Vision» more  MVA 1990»
14 years 10 months ago
Automatic Fire Detection by Changing Region Analysis Based on Geographic Information
This paper proposes a new method for automatic fire detection in cities using image processing techniques. Images are obtained successively at regular intervals from monochrome TV...
Hideo Numagami, Akio Okazaki
AMC
2008
111views more  AMC 2008»
14 years 9 months ago
Chemical agent detector placement methodology
Terrorism is a threat to global peace in our world today and in the future this terrorist threat is surely going to be important. Global terrorist groups have highly sophisticated...
Cevriye Gencer, Emel Kizilkaya Aydogan, Abdullah S...
BMCBI
2007
89views more  BMCBI 2007»
14 years 9 months ago
msmsEval: tandem mass spectral quality assignment for high-throughput proteomics
Background: In proteomics experiments, database-search programs are the method of choice for protein identification from tandem mass spectra. As amino acid sequence databases grow...
Jason W. H. Wong, Matthew J. Sullivan, Hugh M. Car...
BMCBI
2007
177views more  BMCBI 2007»
14 years 9 months ago
The BioPrompt-box: an ontology-based clustering tool for searching in biological databases
Background: High-throughput molecular biology provides new data at an incredible rate, so that the increase in the size of biological databanks is enormous and very rapid. This sc...
Claudio Corsi, Paolo Ferragina, Roberto Marangoni