Sciweavers

1971 search results - page 298 / 395
» A clustering method that uses lossy aggregation of data
Sort
View
111
Voted
BMCBI
2010
153views more  BMCBI 2010»
15 years 22 days ago
Starr: Simple Tiling ARRay analysis of Affymetrix ChIP-chip data
Background: Chromatin immunoprecipitation combined with DNA microarrays (ChIP-chip) is an assay used for investigating DNA-protein-binding or post-translational chromatin/histone ...
Benedikt Zacher, Pei Fen Kuan, Achim Tresch
ISI
2008
Springer
15 years 18 days ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
ICDM
2006
IEEE
226views Data Mining» more  ICDM 2006»
15 years 6 months ago
Converting Output Scores from Outlier Detection Algorithms into Probability Estimates
Current outlier detection schemes typically output a numeric score representing the degree to which a given observation is an outlier. We argue that converting the scores into wel...
Jing Gao, Pang-Ning Tan
IAT
2007
IEEE
15 years 4 months ago
High-Speed Network Traffic Acquisition for Agent Systems
This paper presents a design of high-speed network traffic acquisition subsystem suitable for agent-based intrusion detection systems. To match the performance requirements and to...
Pavel Celeda, Vojtech Krmicek, Martin Rehák...
CIA
2008
Springer
15 years 2 months ago
Trust-Based Classifier Combination for Network Anomaly Detection
Abstract. We present a method that improves the results of network intrusion detection by integration of several anomaly detection algorithms through trust and reputation models. O...
Martin Rehák, Michal Pechoucek, Martin Gril...