Sciweavers

55 search results - page 11 / 11
» Features Based Approach to Identify the P2P File Sharing
Sort
View
BMCBI
2006
142views more  BMCBI 2006»
13 years 4 months ago
Correlated fragile site expression allows the identification of candidate fragile genes involved in immunity and associated with
Background: Common fragile sites (cfs) are specific regions in the human genome that are particularly prone to genomic instability under conditions of replicative stress. Several ...
Angela Re, Davide Corà, Alda Maria Puliti, ...
CORR
2002
Springer
95views Education» more  CORR 2002»
13 years 4 months ago
Unsupervised Learning of Morphology without Morphemes
The first morphological learner based upon the theory of Whole Word Morphology (Ford et al., 1997) is outlined, and preliminary evaluation results are presented. The program, Whol...
Sylvain Neuvel, Sean A. Fulop
BMCBI
2004
146views more  BMCBI 2004»
13 years 4 months ago
Defining transcriptional networks through integrative modeling of mRNA expression and transcription factor binding data
Background: Functional genomics studies are yielding information about regulatory processes in the cell at an unprecedented scale. In the yeast S. cerevisiae, DNA microarrays have...
Feng Gao, Barrett C. Foat, Harmen J. Bussemaker
KDD
2009
ACM
266views Data Mining» more  KDD 2009»
13 years 11 months ago
OpinionMiner: a novel machine learning system for web opinion mining and extraction
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. Unfortunately, reading through al...
Wei Jin, Hung Hay Ho, Rohini K. Srihari
SP
2000
IEEE
105views Security Privacy» more  SP 2000»
13 years 9 months ago
Open Source in Security: Visiting the Bizarre
Although open-source software development has virtues, there is reason to believe that the approach would not have a significant effect on the security of today’s systems. The ...
Fred B. Schneider