Sciweavers

415 search results - page 27 / 83
» Intruders pattern identification
Sort
View
BMCBI
2007
152views more  BMCBI 2007»
15 years 1 months ago
Bioinformatic identification of novel putative photoreceptor specific cis-elements
Background: Cell specific gene expression is largely regulated by different combinations of transcription factors that bind cis-elements in the upstream promoter sequence. However...
Charles G. Danko, Vera A. McIlvain, Maochun Qin, B...
BMCBI
2007
133views more  BMCBI 2007»
15 years 1 months ago
Semi-supervised learning for the identification of syn-expressed genes from fused microarray and in situ image data
Background: Gene expression measurements during the development of the fly Drosophila melanogaster are routinely used to find functional modules of temporally co-expressed genes. ...
Ivan G. Costa, Roland Krause, Lennart Opitz, Alexa...
ICPR
2010
IEEE
15 years 4 months ago
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-Overlapping Audio and Video Streams
Person identification using audio (speech) and visual (facial appearance, static or dynamic) modalities, either independently or jointly, is a thoroughly investigated problem in pa...
Anindya Roy, Sebastien Marcel
IDEAL
2010
Springer
14 years 11 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ASWEC
2005
IEEE
15 years 7 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...