These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

133 related articles for article (PubMed ID: 16240770)

  • 1. On the verification of intransitive noninterference in mulitlevel security.
    Ben Hadj-Alouane N; Lafrance S; Lin F; Mullins J; Yeddes MM
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):948-58. PubMed ID: 16240770
    [TBL] [Abstract][Full Text] [Related]  

  • 2. A geometric approach to support vector machine (SVM) classification.
    Mavroforakis ME; Theodoridis S
    IEEE Trans Neural Netw; 2006 May; 17(3):671-82. PubMed ID: 16722171
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Mining multilevel and location-aware service patterns in mobile web environments.
    Tseng SM; Tsui CF
    IEEE Trans Syst Man Cybern B Cybern; 2004 Dec; 34(6):2480-5. PubMed ID: 15619947
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Intrusion detection using rough set classification.
    Zhang LH; Zhang GH; Zhang J; Bai YC
    J Zhejiang Univ Sci; 2004 Sep; 5(9):1076-86. PubMed ID: 15323002
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Fingerprinting protocol for images based on additive homomorphic property.
    Kuribayashi M; Tanaka H
    IEEE Trans Image Process; 2005 Dec; 14(12):2129-39. PubMed ID: 16370465
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Face verification with balanced thresholds.
    Yan S; Xu D; Tang X
    IEEE Trans Image Process; 2007 Jan; 16(1):262-8. PubMed ID: 17283784
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Velocity-image model for online signature verification.
    Khan MA; Niazi MK; Khan MA
    IEEE Trans Image Process; 2006 Nov; 15(11):3540-9. PubMed ID: 17076411
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Load characterization and anomaly detection for voice over IP traffic.
    Mandjes M; Saniee I; Stolyar AL
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1019-26. PubMed ID: 16252813
    [TBL] [Abstract][Full Text] [Related]  

  • 9. A tighter bound for the echo state property.
    Buehner M; Young P
    IEEE Trans Neural Netw; 2006 May; 17(3):820-4. PubMed ID: 16722187
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Improvement of Laih and Yen's multisignature scheme.
    Xie Q; Yu XY
    J Zhejiang Univ Sci; 2004 Sep; 5(9):1155-9. PubMed ID: 15323013
    [TBL] [Abstract][Full Text] [Related]  

  • 11. AdaBoost-based algorithm for network intrusion detection.
    Hu W; Hu W; Maybank S
    IEEE Trans Syst Man Cybern B Cybern; 2008 Apr; 38(2):577-83. PubMed ID: 18348941
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Spatial-temporal modeling of malware propagation in networks.
    Chen Z; Ji C
    IEEE Trans Neural Netw; 2005 Sep; 16(5):1291-303. PubMed ID: 16252834
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Identification of a discrete planar symmetric shape from a single noisy view.
    Poliannikov OV; Krim H
    IEEE Trans Image Process; 2005 Dec; 14(12):2051-9. PubMed ID: 16370458
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Approach to design neural cryptography: a generalized architecture and a heuristic rule.
    Mu N; Liao X; Huang T
    Phys Rev E Stat Nonlin Soft Matter Phys; 2013 Jun; 87(6):062804. PubMed ID: 23848726
    [TBL] [Abstract][Full Text] [Related]  

  • 15. The fuzzy clustering analysis based on AFS theory.
    Liu X; Wang W; Chai T
    IEEE Trans Syst Man Cybern B Cybern; 2005 Oct; 35(5):1013-27. PubMed ID: 16240775
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Foley-Sammon optimal discriminant vectors using kernel approach.
    Zheng W; Zhao L; Zou C
    IEEE Trans Neural Netw; 2005 Jan; 16(1):1-9. PubMed ID: 15732385
    [TBL] [Abstract][Full Text] [Related]  

  • 17. A convex approach to validation-based learning of the regularization constant.
    Pelckmans K; Suykens JA; De Moor B
    IEEE Trans Neural Netw; 2007 May; 18(3):917-20. PubMed ID: 17526357
    [TBL] [Abstract][Full Text] [Related]  

  • 18. A hybrid model for improving response time in distributed data mining.
    Krishnaswamy S; Loke SW; Zaslasvky A
    IEEE Trans Syst Man Cybern B Cybern; 2004 Dec; 34(6):2466-79. PubMed ID: 15619946
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Formulating face verification with semidefinite programming.
    Yan S; Liu J; Tang X; Huang TS
    IEEE Trans Image Process; 2007 Nov; 16(11):2802-10. PubMed ID: 17990756
    [TBL] [Abstract][Full Text] [Related]  

  • 20. A joint signal processing and cryptographic approach to multimedia encryption.
    Mao Y; Wu M
    IEEE Trans Image Process; 2006 Jul; 15(7):2061-75. PubMed ID: 16830924
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.