Sciweavers

1748 search results - page 146 / 350
» Methods to Create and Use Cross-Domain Analysis Patterns
Sort
View
TEC
2002
89views more  TEC 2002»
15 years 2 months ago
An immunity-based technique to characterize intrusions in computer networks
Abstract--This paper presents a technique inspired by the negative selection mechanism of the immune system that can detect foreign patterns in the complement (nonself) space. In p...
Fabio A. González, Dipankar Dasgupta
BMCBI
2008
148views more  BMCBI 2008»
15 years 3 months ago
Automating dChip: toward reproducible sharing of microarray data analysis
Background: During the past decade, many software packages have been developed for analysis and visualization of various types of microarrays. We have developed and maintained the...
Cheng Li
CIMCA
2005
IEEE
15 years 8 months ago
Modeling the Cross-Cultural Adaptation Process of Immigrants Using Categorical Data Clustering
— This paper introduces a quantitative method for social data analysis, which is based on the use of categorical data clustering. More specifically, we employ categorical data cl...
George E. Tsekouras
MM
2006
ACM
113views Multimedia» more  MM 2006»
15 years 9 months ago
Transductive inference using multiple experts for brushwork annotation in paintings domain
Many recent studies perform annotation of paintings based on brushwork. In these studies the brushwork is modeled indirectly as part of the annotation of high-level artistic conce...
Yelizaveta Marchenko, Tat-Seng Chua, Ramesh Jain
ICDAR
2009
IEEE
15 years 10 months ago
Writer Adaptation for Online Handwriting Recognition System Using Virtual Examples
For an online handwriting recognition system equipped with a writer-independent classifier to progressively improve the recognition performance for a specific writer with an incre...
Hidetoshi Miyao, Minoru Maruyama