Sciweavers

667 search results - page 70 / 134
» Quantization-Based Methods: Additive Attacks Performance Ana...
Sort
View
TIFS
2008
142views more  TIFS 2008»
14 years 11 months ago
An FPGA-Based Network Intrusion Detection Architecture
Abstract--Network intrusion detection systems (NIDSs) monitor network traffic for suspicious activity and alert the system or network administrator. With the onset of gigabit netwo...
Abhishek Das, David Nguyen, Joseph Zambreno, Gokha...
BMCBI
2006
211views more  BMCBI 2006»
14 years 12 months ago
Missing value estimation for DNA microarray gene expression data by Support Vector Regression imputation and orthogonal coding s
Background: Gene expression profiling has become a useful biological resource in recent years, and it plays an important role in a broad range of areas in biology. The raw gene ex...
Xian Wang, Ao Li, Zhaohui Jiang, Huanqing Feng
HCI
2007
15 years 1 months ago
Cultural Difference and Its Effects on User Research Methodologies
Various researches have proved that cultural differences affect the process and results of user research, emphasizing that should cultural attention be given in order to obtain suf...
Jungjoo Lee, Thu-Trang Tran, Kun-Pyo Lee
EMNLP
2009
14 years 9 months ago
Semi-supervised Semantic Role Labeling Using the Latent Words Language Model
Semantic Role Labeling (SRL) has proved to be a valuable tool for performing automatic analysis of natural language texts. Currently however, most systems rely on a large training...
Koen Deschacht, Marie-Francine Moens
ICCV
2009
IEEE
16 years 4 months ago
Efficient subset selection based on the Renyi entropy
Many machine learning algorithms require the summation of Gaussian kernel functions, an expensive operation if implemented straightforwardly. Several methods have been proposed t...
Vlad I. Morariu1, Balaji V. Srinivasan, Vikas C. R...