Sciweavers

25 search results - page 2 / 5
» Generalized Softmax Networks for Non-linear Component Extrac...
Sort
View
SIGMOD
2001
ACM
165views Database» more  SIGMOD 2001»
14 years 5 months ago
Mining System Audit Data: Opportunities and Challenges
Intrusion detection is an essential component of computer security mechanisms. It requires accurate and efficient analysis of a large amount of system and network audit data. It c...
Wenke Lee, Wei Fan
WSDM
2012
ACM
325views Data Mining» more  WSDM 2012»
12 years 1 months ago
Correlating financial time series with micro-blogging activity
We study the problem of correlating micro-blogging activity with stock-market events, defined as changes in the price and traded volume of stocks. Specifically, we collect messa...
Eduardo J. Ruiz, Vagelis Hristidis, Carlos Castill...
BMCBI
2002
214views more  BMCBI 2002»
13 years 5 months ago
Automated modelling of signal transduction networks
Background: Intracellular signal transduction is achieved by networks of proteins and small molecules that transmit information from the cell surface to the nucleus, where they ul...
Martin Steffen, Allegra Petti, John Aach, Patrik D...
ACSAC
2010
IEEE
13 years 3 months ago
Who is tweeting on Twitter: human, bot, or cyborg?
Twitter is a new web application playing dual roles of online social networking and micro-blogging. Users communicate with each other by publishing text-based posts. The popularit...
Zi Chu, Steven Gianvecchio, Haining Wang, Sushil J...
BMCBI
2010
202views more  BMCBI 2010»
13 years 5 months ago
NeMo: Network Module identification in Cytoscape
Background: As the size of the known human interactome grows, biologists increasingly rely on computational tools to identify patterns that represent protein complexes and pathway...
Corban G. Rivera, Rachit Vakil, Joel S. Bader