Sciweavers

2682 search results - page 522 / 537
» TCP rate control
Sort
View
CCS
2010
ACM
14 years 12 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
ICASSP
2010
IEEE
14 years 12 months ago
Privacy and security of features extracted from minutiae aggregates
This paper describes our recent analysis on the security and privacy of biometric feature vectors obtained from fingerprint minutiae. A large number of contiguous regions (cuboid...
Abhishek Nagar, Shantanu Rane, Anthony Vetro
BMCBI
2010
126views more  BMCBI 2010»
14 years 12 months ago
A boosting method for maximizing the partial area under the ROC curve
Background: The receiver operating characteristic (ROC) curve is a fundamental tool to assess the discriminant performance for not only a single marker but also a score function c...
Osamu Komori, Shinto Eguchi
BMCBI
2008
128views more  BMCBI 2008»
14 years 12 months ago
Nonparametric relevance-shifted multiple testing procedures for the analysis of high-dimensional multivariate data with small sa
Background: In many research areas it is necessary to find differences between treatment groups with several variables. For example, studies of microarray data seek to find a sign...
Cornelia Frömke, Ludwig A. Hothorn, Siegfried...
BMCBI
2007
104views more  BMCBI 2007»
14 years 12 months ago
Predicting active site residue annotations in the Pfam database
Background: Approximately 5% of Pfam families are enzymatic, but only a small fraction of the sequences within these families (<0.5%) have had the residues responsible for cata...
Jaina Mistry, Alex Bateman, Robert D. Finn