Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Akshay Vashist"'
Publikováno v:
Pharmaceutical medicine. 35(5)
A Development Safety Update Report (DSUR) is a comprehensive review of safety information collected during an annual reporting period for an investigational drug. The creation of a DSUR is a resource-intensive process, requiring effective communicati
Autor:
Yitzchak M. Gottlieb, Aditya Naidu, Yukiko Sawaya, Ayumu Kubota, Abhrajit Ghosh, A. Yamada, Akshay Vashist, Alexander Poylisher
Publikováno v:
China Communications. 10:56-66
In this paper, we present Real-Time Flow Filter (RTFF) -a system that adopts a middle ground between coarse-grained volume anomaly detection and deep packet inspection. RTFF was designed with the goal of scaling to high volume data feeds that are com
Autor:
Akshay Vashist, Vladimir Vapnik
Publikováno v:
Neural Networks. 22:544-557
In the Afterword to the second edition of the book ''Estimation of Dependences Based on Empirical Data'' by V. Vapnik, an advanced learning paradigm called Learning Using Hidden Information (LUHI) was introduced. This Afterword also suggested an exte
Publikováno v:
International Journal of Computer Mathematics. 84:1285-1297
In object recognition tasks, where images are represented as constellations of image patches, often many patches correspond to the cluttered background. In this paper, we present a two-stage method for selecting the image patches which characterize t
Publikováno v:
IEEE/ACM Transactions on Computational Biology and Bioinformatics. 4:17-27
We present a method for automatically extracting groups of orthologous genes from a large set of genomes by a new clustering algorithm on a weighted multipartite graph. The method assigns a score to an arbitrary subset of genes from multiple genomes
Autor:
Roberto Pagliari, Ritu Chadha, Abhrajit Ghosh, Gregory Hadynski, Yitzchak M. Gottlieb, Akshay Vashist
Publikováno v:
MILCOM
Insider attack detection in an enterprise network environment is a critical problem that currently has no promising solution. It represents a significant challenge since host availability and performance requirements cannot be ignored. A network base
Publikováno v:
IJCNN
Radial basis function (RBF) kernels for SVM have been routinely used in a wide range of classification problems, delivering consistently good performance for those problems where the kernel computations are numerically feasible (high-dimensional prob
Autor:
Alexander Poylisher, G. Levin, Constantin Serban, M. Wolberg, Ritu Chadha, Abhrajit Ghosh, F. Ge, Yitzchak M. Gottlieb, Cho-Yu Jason Chiang, Angelo Sapello, Akshay Vashist, Michael Kaplan, Y. Lin, Kimberly Moeltner, Florin Sultan, K. Kurachik
Publikováno v:
MILCOM
Network management represents one of the most challenging activities in tactical mobile ad hoc networks due to the need for rapid planning and configuration to support a given mission, in the face of large variability in wireless network performance
Publikováno v:
MILCOM
A widely practiced approach for detecting suspicious communication in a network is to formulate the problem as statistical anomaly detection. However, the communication patterns in mission-oriented tactical networks are highly variable and have a muc
Autor:
Akshay Vashist, Konstantine Arkoudas
Publikováno v:
CODASPY
In secure data management the inference problem occurs when data classified at a high security level becomes inferrible from data classified at lower levels. We present a model-theoretic approach to this problem that captures the epistemic state of t