Sciweavers

24680 search results - page 4586 / 4936
» Learning
Sort
View
JMLR
2010
145views more  JMLR 2010»
14 years 10 months ago
Event based text mining for integrated network construction
The scientific literature is a rich and challenging data source for research in systems biology, providing numerous interactions between biological entities. Text mining technique...
Yvan Saeys, Sofie Van Landeghem, Yves Van de Peer
JMLR
2010
185views more  JMLR 2010»
14 years 10 months ago
HMMPayl: an application of HMM to the analysis of the HTTP Payload
Zero-days attacks are one of the most dangerous threats against computer networks. These, by definition, are attacks never seen before. Thus, defense tools based on a database of ...
Davide Ariu, Giorgio Giacinto
JOCN
2010
66views more  JOCN 2010»
14 years 10 months ago
fMRI Activation during Observation of Others' Reach Errors
When exposed to novel dynamical conditions (e.g., externally imposed forces), neurologically intact subjects easily adjust motor commands on the basis of their own reaching errors...
Nicole Malfait, Kenneth F. Valyear, Jody C. Culham...
JSAC
2010
146views more  JSAC 2010»
14 years 10 months ago
NLOS identification and mitigation for localization based on UWB experimental data
Abstract--Sensor networks can benefit greatly from locationawareness, since it allows information gathered by the sensors to be tied to their physical locations. Ultra-wide bandwid...
Stefano Maranò, Wesley M. Gifford, Henk Wym...
JSS
2010
198views more  JSS 2010»
14 years 10 months ago
Accelerated collection of sensor data by mobility-enabled topology ranks
We study the problem of fast and energy-efficient data collection of sensory data using a mobile sink, in wireless sensor networks in which both the sensors and the sink move. Mot...
Constantinos Marios Angelopoulos, Sotiris E. Nikol...
« Prev « First page 4586 / 4936 Last » Next »