Sciweavers

321 search results - page 61 / 65
» System approach to intrusion detection using hidden Markov m...
Sort
View
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 9 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
MIDDLEWARE
2010
Springer
14 years 7 months ago
dFault: Fault Localization in Large-Scale Peer-to-Peer Systems
Distributed hash tables (DHTs) have been adopted as a building block for large-scale distributed systems. The upshot of this success is that their robust operation is even more imp...
Pawan Prakash, Ramana Rao Kompella, Venugopalan Ra...
CIVR
2003
Springer
166views Image Analysis» more  CIVR 2003»
15 years 2 months ago
Evaluation of Expression Recognition Techniques
The most expressive way humans display emotions is through facial expressions. In this work we report on several advances we have made in building a system for classification of f...
Ira Cohen, Nicu Sebe, Yafei Sun, Michael S. Lew, T...
KDD
2008
ACM
159views Data Mining» more  KDD 2008»
15 years 9 months ago
Semi-supervised learning with data calibration for long-term time series forecasting
Many time series prediction methods have focused on single step or short term prediction problems due to the inherent difficulty in controlling the propagation of errors from one ...
Haibin Cheng, Pang-Ning Tan
BMCBI
2007
95views more  BMCBI 2007»
14 years 9 months ago
Methods for estimating human endogenous retrovirus activities from EST databases
Background: Human endogenous retroviruses (HERVs) are surviving traces of ancient retrovirus infections and now reside within the human DNA. Recently HERV expression has been dete...
Merja Oja, Jaakko Peltonen, Jonas Blomberg, Samuel...