Sciweavers

357 search results - page 71 / 72
» An Approach to Detect Executable Content for Anomaly Based N...
Sort
View
ICDM
2006
IEEE
147views Data Mining» more  ICDM 2006»
13 years 11 months ago
Adaptive Parallel Graph Mining for CMP Architectures
Mining graph data is an increasingly popular challenge, which has practical applications in many areas, including molecular substructure discovery, web link analysis, fraud detect...
Gregory Buehrer, Srinivasan Parthasarathy, Yen-Kua...
KDD
2008
ACM
146views Data Mining» more  KDD 2008»
14 years 5 months ago
Spotting out emerging artists using geo-aware analysis of P2P query strings
Record label companies would like to identify potential artists as early as possible in their careers, before other companies approach the artists with competing contracts. The va...
Noam Koenigstein, Yuval Shavitt, Tomer Tankel
BMCBI
2006
142views more  BMCBI 2006»
13 years 5 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
RAID
2010
Springer
13 years 3 months ago
Kernel Malware Analysis with Un-tampered and Temporal Views of Dynamic Kernel Memory
Dynamic kernel memory has been a popular target of recent kernel malware due to the difficulty of determining the status of volatile dynamic kernel objects. Some existing approach...
Junghwan Rhee, Ryan Riley, Dongyan Xu, Xuxian Jian...
BMCBI
2008
150views more  BMCBI 2008»
13 years 5 months ago
13C labeling experiments at metabolic nonstationary conditions: An exploratory study
Background: Stimulus Response Experiments to unravel the regulatory properties of metabolic networks are becoming more and more popular. However, their ability to determine enzyme...
Sebastian Aljoscha Wahl, Katharina Nöh, Wolfg...