Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
    • by  and +1
    •   3  
      PrivacyComputers SecurityFalse positives
Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the... more
    • by 
    •   6  
      Machine LearningIntrusion DetectionAlert ClassificationAlert Generalization
    • by 
    •   12  
      Forensic ScienceMultidisciplinarySample PreparationHumans
Resumen: Objetivo/contexto: en este artículo nos enfocamos en las dimensiones simbólicas y prácticas del manejo de la corporalidad del enemigo, empleada por los paramilitares durante su auge tras la unificación de las Autodefensas Unidas... more
    • by  and +2
    •   18  
      Anthropology of the BodyThe BodyTransitional JusticeCuerpo
    • by 
    •   17  
      EconomicsManufacturingInvestmentsProbability
    • by 
    •   8  
      PsychophysiologyBiological SciencesHumansArousal
    • by 
    •   4  
      Software SecurityData MiningWeb ApplicationsFalse positives
    • by 
    •   13  
      Forensic ScienceMultidisciplinarySample PreparationHumans
    • by 
    •   3  
      ProbabilityWeightFalse positives
    • by 
    •   5  
      Resource ManagementData StructuresAccuracyC
    • by 
    •   23  
      GeneticsAnimal StudiesToxicologyGenetic Toxicology
    • by 
    •   20  
      Computer ScienceComparative StudyMedicinePerformance Evaluation
    • by 
    •   17  
      GeologyGeophysicsMigrationOil Industry
    • by 
    •   3  
      Strategic ManagementHypothesis testingFalse positives
    • by 
    •   18  
      Science PolicyCoffeeEnvironmental HealthRisk
    • by 
    •   12  
      GeneticsGenomicsNext generation sequencingHumans
    • by 
    •   11  
      Pattern RecognitionScale-Free NetworksGaussian Mixture ModelLarge classes
    • by 
    •   12  
      Computer ScienceInformation RetrievalImage segmentationSurface Waves
Propósito: reflexionar sobre dos maneras de asumir la democracia (como forma de gobierno y como estilo de vida), con el fin de pensar desde la psicología social —asumida como una psicología que es política— su relación con la biopolítica,... more
    • by 
    •   17  
      PsychologySocial PsychologyPoliticsGiorgio Agamben
    • by 
    •   16  
      CardiologyImagingMedicineHumans
    • by 
    •   4  
      Anomaly DetectionNetwork Intrusion Detection & PreventionComputersFalse positives
    • by 
    •   10  
      Principal Component AnalysisArtificial Neural NetworksBiomedical ImagingImage Classification
    • by 
    •   13  
      Human GeographyInformation TechnologyPhilosophyEthics
Short indicator RNA sequences (,100 bp) persist after autoclaving and are recovered intact by molecular amplification. Primers targeting longer sequences are most likely to produce false positives due to amplification errors easily... more
    • by  and +1
    •   9  
      MicrobiologyNatureReal-time RT-PCRDna Sequencing
Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection... more
    • by 
    •   4  
      Anomaly DetectionHidden Markov ModelsIntrusions and Misuse DetectionFalse positives
    • by 
    •   9  
      Computer ScienceIntrusion DetectionDecision TreeDiscretization
    • by 
    •   9  
      Computer ScienceIntrusion DetectionDecision TreeDiscretization
Intrusion Detection Systems (IDS) monitor a secured network for the evidence of malicious activities originating either inside or outside. Upon identifying a suspicious traffic, IDS generates and logs an alert. Unfortunately, most of the... more
    • by 
    •   6  
      Machine LearningIntrusion DetectionAlert ClassificationAlert Generalization
    • by 
    •   16  
      Pharmaceutical TechnologyDrug DiscoveryNMR SpectroscopyMagnetic Resonance Spectroscopy
All 684 post-orthotopic liver transplantation (OLT) liver biopsies performed at the Royal Free Hospital (RFH) between 1988 and 1993, from 120 patients, were reviewed in order to try to define the relative importance of the histological... more
    • by 
    •   23  
      FeaturesHepatologyBiopsyPCR
    • by 
    •   5  
      CADCT ColonographySensitivity and SpecificityComputer Aided Detection
    • by  and +1
    •   5  
      CADCT ColonographySensitivity and SpecificityComputer Aided Detection
    • by 
    •   19  
      Applied EconomicsLinear modelsScreeningHumans
Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed... more
    • by 
    •   15  
      Computer ScienceMeasurementInternet ArchitectureBit Error Rate
    • by 
    •   13  
      MathematicsComputer SciencePattern RecognitionScale-Free Networks
    • by 
    •   9  
      UsabilityStatic AnalysisProgram AnalysisDynamic Analysis
    • by 
    •   2  
      Applied EconomicsFalse positives
    • by 
    •   13  
      Human GeographyInformation TechnologyPhilosophyEthics
    • by 
    •   3  
      Remote SensingCloudFalse positives
    • by 
    •   18  
      Science PolicyCoffeeEnvironmental HealthRisk
Architectural distortion is a commonly missed sign of breast cancer. This paper investigates the detection of architectural distortion, in mammograms of interval-cancer cases taken prior to the diagnosis of breast cancer, using Gabor... more
    • by 
    •   57  
      EngineeringPhysiologyAlgorithmsGynaecology
This paper presents methods for the detection of architectural distortion in mammograms of interval-cancer cases taken prior to the diagnosis of breast cancer, using Gabor filters, phase portrait analysis, fractal dimension (FD), and... more
    • by 
    •   57  
      EngineeringPhysiologyAlgorithmsGynaecology
We present methods for the detection of architectural distortion in mammograms of interval-cancer cases taken prior to the diagnosis of breast cancer using measures of angular distribution derived from Gabor filter responses in magnitude... more
    • by 
    •   57  
      EngineeringPhysiologyAlgorithmsGynaecology
Software clones have been widely studied in the recent literature and shown useful for finding bugs because inconsistent changes among clones in a clone group may indicate potential bugs. However, many inconsistent clone groups are not... more
    • by 
    •   8  
      Anomaly DetectionProgrammingEclipseFeature Extraction
Treadmill exercise testing has low specificity for the detection of significant epicardial coronary artery disease (CAD). A possible mechanism to explain some of the false positives is transient subendocardial ischemia induced by... more
    • by  and +2
    •   11  
      Prospective studiesHumansFemaleMale
Detection of IgA-transglutaminase2 (TG2) autoantibodies has become the test of choice for the diagnosis and monitoring of celiac disease (CD), and is recommended as the serological ‘gold standard’ by most of the CD societies. Despite its... more
    • by  and +1
    •   7  
      AntibodiesCeliac DiseaseDiagnosisFalse Negatives