Sciweavers

2424 search results - page 82 / 485
» A general algorithm for data dependence analysis
Sort
View
CSFW
2004
IEEE
15 years 6 months ago
Using Active Learning in Intrusion Detection
Intrusion Detection Systems (IDSs) have become an important part of operational computer security. They are the last line of defense against malicious hackers and help detect ongo...
Magnus Almgren, Erland Jonsson
BMCBI
2008
121views more  BMCBI 2008»
15 years 3 months ago
Stability of gene contributions and identification of outliers in multivariate analysis of microarray data
Background: Multivariate ordination methods are powerful tools for the exploration of complex data structures present in microarray data. These methods have several advantages com...
Florent Baty, Daniel Jaeger, Frank Preiswerk, Mart...
MICRO
2009
IEEE
326views Hardware» more  MICRO 2009»
15 years 9 months ago
DDT: design and evaluation of a dynamic program analysis for optimizing data structure usage
Data structures define how values being computed are stored and accessed within programs. By recognizing what data structures are being used in an application, tools can make app...
Changhee Jung, Nathan Clark
BMCBI
2005
85views more  BMCBI 2005»
15 years 3 months ago
Processing methods for differential analysis of LC/MS profile data
Background: Liquid chromatography coupled to mass spectrometry (LC/MS) has been widely used in proteomics and metabolomics research. In this context, the technology has been incre...
Mikko Katajamaa, Matej Oresic
PODC
2009
ACM
16 years 3 months ago
Distributed and parallel algorithms for weighted vertex cover and other covering problems
The paper presents distributed and parallel -approximation algorithms for covering problems, where is the maximum number of variables on which any constraint depends (for example...
Christos Koufogiannakis, Neal E. Young