-
2
-
-
0035164084
-
One-class SVM for learning in image retrieval
-
Thessaloniki, Greece, October
-
Yunqiang Chen, Xiang Zhou and Thomas Huang, "One-class SVM for Learning in Image Retrieval", Proc. IEEE Int'l Conf. on Image Processing (ICIP'01 Oral), Thessaloniki, Greece, October, 2001.
-
(2001)
Proc. IEEE Int'l Conf. on Image Processing (ICIP'01 Oral)
-
-
Chen, Y.1
Zhou, X.2
Huang, T.3
-
3
-
-
84944736505
-
Intrusion detection: A bioinformatics approach
-
Las Vegas, Nevada, December 08-12
-
Scott Coull, Joel Branch and Boleslaw Szymanski et al., "Intrusion Detection: A Bioinformatics Approach", 19th Annual Computer Security Applications Conference, Las Vegas, Nevada, December 08-12, 2003.
-
(2003)
19th Annual Computer Security Applications Conference
-
-
Coull, S.1
Branch, J.2
Szymanski, B.3
-
5
-
-
15944396559
-
A CONCEPTOR: The network of neurally connected concept nests for knowledge representation
-
RPI
-
Konrad R. Fiakowski & Boleslaw K Szymanski, "A CONCEPTOR: the Network of Neurally Connected Concept Nests for Knowledge Representation", Technical Report, RPI 1996.
-
(1996)
Technical Report
-
-
Fiakowski, K.R.1
Szymanski, B.K.2
-
6
-
-
33749590685
-
The myth of the double-blind review? Author identification using only citations
-
Shawndra Hill and Foster Provost, "The Myth of the Double-Blind Review? Author Identification Using Only Citations", SIGKDD Explorations, Volume 5, Issue 2 P179-184.
-
SIGKDD Explorations
, vol.5
, Issue.2
-
-
Hill, S.1
Provost, F.2
-
7
-
-
0034187691
-
Data strip mining for the virtual design of pharmaceuticals with neural networks
-
May
-
Robert H. Kewley, Mark J. Embrechts, et al. "Data Strip Mining for the Virtual Design of Pharmaceuticals with Neural Networks", IEEE Transactions on Neural Networks, Volume 11, Issue 3, May 2000.
-
(2000)
IEEE Transactions on Neural Networks
, vol.11
, Issue.3
-
-
Kewley, R.H.1
Embrechts, M.J.2
-
8
-
-
0030653064
-
Authorship analysis: Identifying the author of a program
-
Submitted to
-
Ivan Krsul, Eugene H. Spafford, "Authorship Analysis: Identifying the Author of a Program", Submitted to Computers and Security.
-
Computers and Security
-
-
Krsul, I.1
Spafford, E.H.2
-
10
-
-
0008496059
-
The unsupervised acquisition of a lexicon from continuous speech
-
AI Lab., MIT. Cambridge, Massachusetts
-
Carl de Marcken, "The Unsupervised Acquisition of a Lexicon from Continuous Speech", Technical Report A.I. Memo No. 1558, AI Lab., MIT. Cambridge, Massachusetts. 1995.
-
(1995)
Technical Report A.I. Memo No. 1558
, vol.1558
-
-
De Marcken, C.1
-
11
-
-
26444534033
-
SVM based feature Weighting method for image retrieval
-
Juan-les-Pins on the French Riviera, December
-
Fang Qian, Mingjing Li and Hong-Jiang Zhang et al., "SVM Based Feature Weighting Method for Image Retrieval", Fourth International Workshop On Multimedia Information Retrieval, Juan-les-Pins on the French Riviera, December, 2002.
-
(2002)
Fourth International Workshop on Multimedia Information Retrieval
-
-
Qian, F.1
Li, M.2
Zhang, H.-J.3
-
12
-
-
0012282403
-
Computer intrusion: Detecting masquerades
-
February
-
Matthias Schonlau, W. Dumouchel, Wen-Hua Ju et al. "Computer Intrusion: Detecting Masquerades", Statistical Science, 16(1):58-74, February 2001.
-
(2001)
Statistical Science
, vol.16
, Issue.1
, pp. 58-74
-
-
Schonlau, M.1
Dumouchel, W.2
Ju, W.-H.3
-
13
-
-
0014757386
-
A general method applicable to the search for similarities in the amino acid sequence of two proteins
-
Needleman, S. and Wunsch, C. "A general method applicable to the search for similarities in the amino acid sequence of two proteins", Journal of Molecular Biology, 48: 444-453, 1970.
-
(1970)
Journal of Molecular Biology
, vol.48
, pp. 444-453
-
-
Needleman, S.1
Wunsch, C.2
|