Sciweavers

4911 search results - page 706 / 983
» Tree dependence analysis
Sort
View
VLDB
2007
ACM
164views Database» more  VLDB 2007»
16 years 4 months ago
A new intrusion detection system using support vector machines and hierarchical clustering
Whenever an intrusion occurs, the security and value of a computer system is compromised. Network-based attacks make it difficult for legitimate users to access various network ser...
Latifur Khan, Mamoun Awad, Bhavani M. Thuraisingha...
146
Voted
ICSE
2001
IEEE-ACM
15 years 8 months ago
Using Transformation Systems for Software Maintenance and Reengineering
Software maintenance costs dominate software engineering costs, partly because most such engineering is done manually. Program Transformation tools leverage an engineer-provided b...
Ira D. Baxter
IJCNN
2000
IEEE
15 years 8 months ago
EM Algorithms for Self-Organizing Maps
eresting web-available abstracts and papers on clustering: An Analysis of Recent Work on Clustering Algorithms (1999), Daniel Fasulo : This paper describes four recent papers on cl...
Tom Heskes, Jan-Joost Spanjers, Wim Wiegerinck
ICSE
2000
IEEE-ACM
15 years 7 months ago
Galileo: a tool built from mass-market applications
We present Galileo, an innovative engineering modeling and analysis tool built using an approach we call packageoriented programming (POP). Galileo represents an ongoing evaluatio...
David Coppit, Kevin J. Sullivan
BMCBI
2010
208views more  BMCBI 2010»
15 years 3 months ago
Using machine learning to speed up manual image annotation: application to a 3D imaging protocol for measuring single cell gene
Background: Image analysis is an essential component in many biological experiments that study gene expression, cell cycle progression, and protein localization. A protocol for tr...
Zafer Aydin, John I. Murray, Robert H. Waterston, ...