Sciweavers

2248 search results - page 221 / 450
» Using Bayesian networks to analyze expression data
Sort
View
ECRIME
2007
15 years 7 months ago
A comparison of machine learning techniques for phishing detection
There are many applications available for phishing detection. However, unlike predicting spam, there are only few studies that compare machine learning techniques in predicting ph...
Saeed Abu-Nimeh, Dario Nappa, Xinlei Wang, Suku Na...
NIPS
2000
15 years 4 months ago
Learning Switching Linear Models of Human Motion
The human figure exhibits complex and rich dynamic behavior that is both nonlinear and time-varying. Effective models of human dynamics can be learned from motion capture data usi...
Vladimir Pavlovic, James M. Rehg, John MacCormick
TOG
2010
157views more  TOG 2010»
14 years 10 months ago
Computer-generated residential building layouts
We present a method for automated generation of building layouts for computer graphics applications. Our approach is motivated by the layout design process developed in architectu...
Paul Merrell, Eric Schkufza, Vladlen Koltun
WABI
2009
Springer
124views Bioinformatics» more  WABI 2009»
15 years 10 months ago
Mimosa: Mixture Model of Co-expression to Detect Modulators of Regulatory Interaction
Background: Functionally related genes tend to be correlated in their expression patterns across multiple conditions and/or tissue-types. Thus co-expression networks are often use...
Matthew Hansen, Logan Everett, Larry Singh, Sridha...
110
Voted
ACSAC
2006
IEEE
15 years 9 months ago
Towards Database Firewall: Mining the Damage Spreading Patterns
Access control and integrity constraints are well known approaches to ensure data integrity in commercial database systems. However, due to operational mistakes, malicious intent ...
Kun Bai, Peng Liu