Sciweavers

645 search results - page 112 / 129
» On the limits of dictatorial classification
Sort
View
CCR
2006
89views more  CCR 2006»
14 years 9 months ago
A passive state-machine approach for accurate analysis of TCP out-of-sequence segments
In this paper we describe a new tool being made available to the networking research community for passive analysis of TCP segment traces. The purpose of the tool is to provide mo...
Sushant Rewaskar, Jasleen Kaur, F. Donelson Smith
COMPUTING
2006
100views more  COMPUTING 2006»
14 years 9 months ago
Interval Arithmetic with Containment Sets
The idea of containment sets (csets) is due to Walster and Hansen, and the theory is mainly due to the first author. Now that floating point computation with infinities is widely a...
John D. Pryce, George F. Corliss
ESWA
2006
161views more  ESWA 2006»
14 years 9 months ago
Automated trend analysis of proteomics data using an intelligent data mining architecture
Proteomics is a field dedicated to the analysis and identification of proteins within an organism. Within proteomics, two-dimensional electrophoresis (2-DE) is currently unrivalle...
James Malone, Kenneth McGarry, Chris Bowerman
IJNSEC
2008
95views more  IJNSEC 2008»
14 years 9 months ago
Generalized Anomaly Detection Model for Windows-based Malicious Program Behavior
In this paper we demonstrate that it is possible in general to detect Windows-based malicious program behavior. Since S. Forrest et al. used the N-grams method to classify system ...
Xin Tang, Constantine N. Manikopoulos, Sotirios G....
IJCV
2006
124views more  IJCV 2006»
14 years 9 months ago
Representation Analysis and Synthesis of Lip Images Using Dimensionality Reduction
Understanding facial expressions in image sequences is an easy task for humans. Some of us are capable of lipreading by interpreting the motion of the mouth. Automatic lipreading b...
Michal Aharon, Ron Kimmel