Sciweavers

BMCBI
2007
102views more  BMCBI 2007»
13 years 4 months ago
A mixture of feature experts approach for protein-protein interaction prediction
High-throughput methods can directly detect the set of interacting proteins in yeast but the results are often incomplete and exhibit high false positive and false negative rates....
Yanjun Qi, Judith Klein-Seetharaman, Ziv Bar-Josep...
BMCBI
2007
94views more  BMCBI 2007»
13 years 5 months ago
False positive reduction in protein-protein interaction predictions using gene ontology annotations
Background: Many crucial cellular operations such as metabolism, signalling, and regulations are based on protein-protein interactions. However, the lack of robust protein-protein...
Mahmood A. Mahdavi, Yen-Han Lin
BMCBI
2010
119views more  BMCBI 2010»
13 years 5 months ago
A comparison of internal validation techniques for multifactor dimensionality reduction
Background: It is hypothesized that common, complex diseases may be due to complex interactions between genetic and environmental factors, which are difficult to detect in high-di...
Stacey J. Winham, Andrew J. Slater, Alison A. Mots...
BMCBI
2010
103views more  BMCBI 2010»
13 years 5 months ago
Nonparametric methods for the analysis of single-color pathogen microarrays
Background: The analysis of oligonucleotide microarray data in pathogen surveillance and discovery is a challenging task. Target template concentration, nucleic acid integrity, an...
Omar J. Jabado, Sean Conlan, P. Lan Quan, Jeffrey ...
CSREASAM
2006
13 years 6 months ago
An Efficient Bloom Filter Based Solution for Multiparty Private Matching
- The issue of privacy becomes more and more important. On the other hand, online collaboration among different parties is almost unavoidable. How to allow collaboration while prot...
Pierre K. Y. Lai, Siu-Ming Yiu, K. P. Chow, C. F. ...
AAAI
2006
13 years 6 months ago
When Gossip is Good: Distributed Probabilistic Inference for Detection of Slow Network Intrusions
Intrusion attempts due to self-propagating code are becoming an increasingly urgent problem, in part due to the homogeneous makeup of the internet. Recent advances in anomalybased...
Denver Dash, Branislav Kveton, John Mark Agosta, E...
ICDCS
2010
IEEE
13 years 8 months ago
B-SUB: A Practical Bloom-Filter-Based Publish-Subscribe System for Human Networks
—The adoption of portable wireless devices is rapidly rising. The demand for efficient communication protocols amongst these devices is pressing. In this paper, we present a con...
Yaxiong Zhao, Jie Wu
RAID
1999
Springer
13 years 9 months ago
Defending against a Denial-of-Service Attack on TCP
In this paper we propose a real-time anomaly detection method for detecting TCP SYN-flooding attacks. This method is based on the intensities of SYN segments which are measured on...
Pars Mutaf
RAID
2004
Springer
13 years 10 months ago
HoneyStat: Local Worm Detection Using Honeypots
Worm detection systems have traditionally used global strategies and focused on scan rates. The noise associated with this approach requires statistical techniques and large data s...
David Dagon, Xinzhou Qin, Guofei Gu, Wenke Lee, Ju...
ACCV
2007
Springer
13 years 11 months ago
Object Detection Combining Recognition and Segmentation
Abstract. We develop an object detection method combining top-down recognition with bottom-up image segmentation. There are two main steps in this method: a hypothesis generation s...
Liming Wang, Jianbo Shi, Gang Song, I-fan Shen