Sciweavers

345 search results - page 64 / 69
» Using Active Learning in Intrusion Detection
Sort
View
BMCBI
2008
97views more  BMCBI 2008»
14 years 10 months ago
SiteSeek: Post-translational modification analysis using adaptive locality-effective kernel methods and new profiles
Background: Post-translational modifications have a substantial influence on the structure and functions of protein. Post-translational phosphorylation is one of the most common m...
Paul D. Yoo, Yung Shwen Ho, Bing Bing Zhou, Albert...
MLMI
2005
Springer
15 years 3 months ago
The TNO Speaker Diarization System for NIST RT05s Meeting Data
The TNO speaker speaker diarization system is based on a standard BIC segmentation and clustering algorithm. Since for the NIST Rich Transcription speaker dizarization evaluation m...
David van Leeuwen
DAGM
2007
Springer
15 years 4 months ago
A Multi-view Camera System for the Generation of Real-Time Occlusion-Free Scene Video
This paper presents a novel multi-view camera system that produces real-time single view scene video which sees through the static objects to observe the dynamic objects. The syste...
Alparslan Yildiz, Yusuf Sinan Akgul
79
Voted
ISBI
2004
IEEE
15 years 11 months ago
Enhanced Snake-Based Segmentation of Vocal Folds
We present a system to segment the medial edges of the vocal folds from stroboscopic video. The system has two components. The first learns a color transformation that optimally d...
Sonya Allin, John M. Galeotti, George D. Stetten, ...
WISE
2006
Springer
15 years 4 months ago
Finding Reliable Recommendations for Trust Model
This paper presents a novel context-based approach to find reliable recommendations for trust model in ubiquitous environments. Context is used in our approach to analyze the userâ...
Weiwei Yuan, Donghai Guan, Sungyoung Lee, Young-Ko...