Sciweavers

415 search results - page 27 / 83
» Intruders pattern identification
Sort
View
BMCBI
2007
152views more  BMCBI 2007»
14 years 10 months ago
Bioinformatic identification of novel putative photoreceptor specific cis-elements
Background: Cell specific gene expression is largely regulated by different combinations of transcription factors that bind cis-elements in the upstream promoter sequence. However...
Charles G. Danko, Vera A. McIlvain, Maochun Qin, B...
BMCBI
2007
133views more  BMCBI 2007»
14 years 10 months ago
Semi-supervised learning for the identification of syn-expressed genes from fused microarray and in situ image data
Background: Gene expression measurements during the development of the fly Drosophila melanogaster are routinely used to find functional modules of temporally co-expressed genes. ...
Ivan G. Costa, Roland Krause, Lennart Opitz, Alexa...
ICPR
2010
IEEE
15 years 1 months ago
Crossmodal Matching of Speakers Using Lip and Voice Features in Temporally Non-Overlapping Audio and Video Streams
Person identification using audio (speech) and visual (facial appearance, static or dynamic) modalities, either independently or jointly, is a thoroughly investigated problem in pa...
Anindya Roy, Sebastien Marcel
IDEAL
2010
Springer
14 years 7 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...
ASWEC
2005
IEEE
15 years 3 months ago
A Comparison of Reverse Engineering Tools Based on Design Pattern Decomposition
The usefulness of design patterns in forward engineering is already well-known and several tools provide support for their application in the development of software systems. Whil...
Francesca Arcelli Fontana, Stefano Masiero, Claudi...