Sciweavers

345 search results - page 64 / 69
» Using Active Learning in Intrusion Detection
Sort
View
BMCBI
2008
97views more  BMCBI 2008»
15 years 16 days ago
SiteSeek: Post-translational modification analysis using adaptive locality-effective kernel methods and new profiles
Background: Post-translational modifications have a substantial influence on the structure and functions of protein. Post-translational phosphorylation is one of the most common m...
Paul D. Yoo, Yung Shwen Ho, Bing Bing Zhou, Albert...
MLMI
2005
Springer
15 years 6 months ago
The TNO Speaker Diarization System for NIST RT05s Meeting Data
The TNO speaker speaker diarization system is based on a standard BIC segmentation and clustering algorithm. Since for the NIST Rich Transcription speaker dizarization evaluation m...
David van Leeuwen
102
Voted
DAGM
2007
Springer
15 years 6 months ago
A Multi-view Camera System for the Generation of Real-Time Occlusion-Free Scene Video
This paper presents a novel multi-view camera system that produces real-time single view scene video which sees through the static objects to observe the dynamic objects. The syste...
Alparslan Yildiz, Yusuf Sinan Akgul
89
Voted
ISBI
2004
IEEE
16 years 1 months ago
Enhanced Snake-Based Segmentation of Vocal Folds
We present a system to segment the medial edges of the vocal folds from stroboscopic video. The system has two components. The first learns a color transformation that optimally d...
Sonya Allin, John M. Galeotti, George D. Stetten, ...
WISE
2006
Springer
15 years 6 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...