Sciweavers

134 search results - page 26 / 27
» Discovering Correlations in Annotated Databases
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 7 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
DIMVA
2008
13 years 7 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
BMCBI
2008
87views more  BMCBI 2008»
13 years 5 months ago
Identification of deleterious non-synonymous single nucleotide polymorphisms using sequence-derived information
Background: As the number of non-synonymous single nucleotide polymorphisms (nsSNPs), also known as single amino acid polymorphisms (SAPs), increases rapidly, computational method...
Jing Hu, Changhui Yan
BMCBI
2010
100views more  BMCBI 2010»
13 years 3 months ago
New insights into protein-protein interaction data lead to increased estimates of the S. cerevisiae interactome size
Background: As protein interactions mediate most cellular mechanisms, protein-protein interaction networks are essential in the study of cellular processes. Consequently, several ...
Laure Sambourg, Nicolas Thierry-Mieg
BIBM
2009
IEEE
172views Bioinformatics» more  BIBM 2009»
13 years 10 months ago
Identifying Gene Signatures from Cancer Progression Data Using Ordinal Analysis
—A comprehensive understanding of cancer progression may shed light on genetic and molecular mechanisms of oncogenesis, and it may provide much needed information for effective d...
Yoon Soo Pyon, Jing Li