Sciweavers

321 search results - page 55 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
85
Voted
DATE
2000
IEEE
110views Hardware» more  DATE 2000»
15 years 1 months ago
Stochastic Modeling and Performance Evaluation for Digital Clock and Data Recovery Circuits
Clock and data recovery circuits are essential components in communication systems. They directly influence the bit-error-rate performance of communication links. It is desirable...
Alper Demir, Peter Feldmann
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 1 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
KES
2008
Springer
14 years 8 months ago
Classification of Sporadic and BRCA1 Ovarian Cancer Based on a Genome-Wide Study of Copy Number Variations
Abstract. Motivation: Although studies have shown that genetic alterations are causally involved in numerous human diseases, still not much is known about the molecular mechanisms ...
Anneleen Daemen, Olivier Gevaert, Karin Leunen, Va...
IJON
2006
146views more  IJON 2006»
14 years 9 months ago
Feature selection and classification using flexible neural tree
The purpose of this research is to develop effective machine learning or data mining techniques based on flexible neural tree FNT. Based on the pre-defined instruction/operator se...
Yuehui Chen, Ajith Abraham, Bo Yang
LREC
2010
188views Education» more  LREC 2010»
14 years 11 months ago
Example-Based Automatic Phonetic Transcription
Current state-of-the-art systems for automatic phonetic transcription (APT) are mostly phone recognizers based on Hidden Markov models (HMMs). We present a different approach for ...
Christina Leitner, Martin Schickbichler, Stefan Pe...