Sciweavers

1804 search results - page 225 / 361
» Intrusion Detection Using Sequences of System Calls
Sort
View
NIPS
2008
15 years 5 months ago
Hierarchical Fisher Kernels for Longitudinal Data
We develop new techniques for time series classification based on hierarchical Bayesian generative models (called mixed-effect models) and the Fisher kernel derived from them. A k...
Zhengdong Lu, Todd K. Leen, Jeffrey Kaye
AAAI
1997
15 years 5 months ago
A Script-Based Approach to Modifying Knowledge Bases
Our goal is to build knowledge acquisition tools that support users in modifying knowledge-based systems. These modi cations may require several individual changes to various comp...
Yolanda Gil, Marcelo Tallis
BMCBI
2010
139views more  BMCBI 2010»
15 years 4 months ago
PoGO: Prediction of Gene Ontology terms for fungal proteins
Background: Automated protein function prediction methods are the only practical approach for assigning functions to genes obtained from model organisms. Many of the previously re...
Jaehee Jung, Gangman Yi, Serenella A. Sukno, Micha...
ICPR
2010
IEEE
15 years 2 months ago
Tracking Ships from Fast Moving Camera through Image Registration
This paper presents an algorithm that detects and tracks marine vessels in video taken by a non-stationary camera installed on an untethered buoy. 1 The video is characterized by ...
Sergiy Fefilatyev, Dmitry B. Goldgof, Chad Lembke
CSREASAM
2006
15 years 5 months ago
A New Robust and Secure Steganographic System for Greyscale Images
: The research work in this paper shows that the currently available stenographic methods might be quite easily detected by using sufficiently careful analysis of the transmitted d...
Hesham Elzouka