Sciweavers

1180 search results - page 219 / 236
» A Logical Data Model for Integrated Geographical Databases
Sort
View
ACSAC
2002
IEEE
15 years 2 months ago
Composable Tools For Network Discovery and Security Analysis
Security analysis should take advantage of a reliable knowledge base that contains semantically-rich information about a protected network. This knowledge is provided by network m...
Giovanni Vigna, Fredrik Valeur, Jingyu Zhou, Richa...
CIKM
2009
Springer
15 years 4 months ago
POkA: identifying pareto-optimal k-anonymous nodes in a domain hierarchy lattice
Data generalization is widely used to protect identities and prevent inference of sensitive information during the public release of microdata. The k-anonymity model has been exte...
Rinku Dewri, Indrajit Ray, Indrakshi Ray, Darrell ...
BMCBI
2005
116views more  BMCBI 2005»
14 years 9 months ago
Which gene did you mean?
Computational Biology needs computer-readable information records. Increasingly, meta-analysed and pre-digested information is being used in the follow up of high throughput exper...
Barend Mons
BMCBI
2005
169views more  BMCBI 2005»
14 years 9 months ago
MAPPER: a search engine for the computational identification of putative transcription factor binding sites in multiple genomes
Background: Cis-regulatory modules are combinations of regulatory elements occurring in close proximity to each other that control the spatial and temporal expression of genes. Th...
Voichita D. Marinescu, Isaac S. Kohane, Alberto Ri...
CORR
2008
Springer
123views Education» more  CORR 2008»
14 years 9 months ago
Provenance Traces
Provenance is information about the origin, derivation, ownership, or history of an object. It has recently been studied extensively in scientific databases and other settings due...
James Cheney, Umut A. Acar, Amal Ahmed