Sciweavers

26 search results - page 4 / 6
» A series of PDB related databases for everyday needs
Sort
View
ISF
2008
114views more  ISF 2008»
14 years 9 months ago
An OVAL-based active vulnerability assessment system for enterprise computer networks
Abstract Many security problems are caused by vulnerabilities hidden in enterprise computer networks. It is very important for system administrators to have knowledge about the sec...
Xiuzhen Chen, Qinghua Zheng, Xiaohong Guan
106
Voted
ADVIS
2004
Springer
15 years 3 months ago
Incremental Association Rule Mining Using Materialized Data Mining Views
Data mining is an interactive and iterative process. Users issue series of similar queries until they receive satisfying results, yet currently available data mining systems do not...
Mikolaj Morzy, Tadeusz Morzy, Zbyszko Króli...
CAISE
2007
Springer
15 years 3 months ago
Declarative XML Data Cleaning with XClean
Data cleaning is the process of correcting anomalies in a data source, that may for instance be due to typographical errors, or duplicate representations of an entity. It is a cruc...
Melanie Weis, Ioana Manolescu
BMCBI
2010
130views more  BMCBI 2010»
14 years 9 months ago
MLPAinter for MLPA interpretation: an integrated approach for the analysis, visualisation and data management of Multiplex Ligat
Background: Multiplex Ligation-Dependent Probe Amplification (MLPA) is an application that can be used for the detection of multiple chromosomal aberrations in a single experiment...
Ronald van Eijk, Paul H. C. Eilers, Remco Natt&eac...
82
Voted
KDD
2007
ACM
209views Data Mining» more  KDD 2007»
15 years 10 months ago
Temporal causal modeling with graphical granger methods
The need for mining causality, beyond mere statistical correlations, for real world problems has been recognized widely. Many of these applications naturally involve temporal data...
Andrew Arnold, Yan Liu, Naoki Abe