Sciweavers

415 search results - page 82 / 83
» Identifying web spam with user behavior analysis
Sort
View
ISSTA
2009
ACM
13 years 11 months ago
AVA: automated interpretation of dynamically detected anomalies
Dynamic analysis techniques have been extensively adopted to discover causes of observed failures. In particular, anomaly detection techniques can infer behavioral models from obs...
Anton Babenko, Leonardo Mariani, Fabrizio Pastore
CCS
2011
ACM
12 years 5 months ago
Forensic investigation of the OneSwarm anonymous filesharing system
OneSwarm is a system for anonymous p2p file sharing in use by thousands of peers. It aims to provide Onion Routing-like privacy and BitTorrent-like performance. We demonstrate se...
Swagatika Prusty, Brian Neil Levine, Marc Liberato...
BMCBI
2008
136views more  BMCBI 2008»
13 years 5 months ago
GPAT: Retrieval of genomic annotation from large genomic position datasets
Background: Recent genome wide transcription factor binding site or chromatin modification mapping analysis techniques, such as chromatin immunoprecipitation (ChIP) linked to DNA ...
Arnaud Krebs, Mattia Frontini, Làszlò...
BMCBI
2006
118views more  BMCBI 2006»
13 years 5 months ago
Exploration of biological network centralities with CentiBiN
Background: The elucidation of whole-cell regulatory, metabolic, interaction and other biological networks generates the need for a meaningful ranking of network elements. Central...
Björn H. Junker, Dirk Koschützki, Falk S...
BMCBI
2006
190views more  BMCBI 2006»
13 years 5 months ago
SNPs3D: Candidate gene and SNP selection for association studies
Background: The relationship between disease susceptibility and genetic variation is complex, and many different types of data are relevant. We describe a web resource and databas...
Peng Yue, Eugene Melamud, John Moult