Existing security models require that information of a given security level be prevented from “leaking” into lower-security information. High-security applications must be dem...
DNA Microarray provides a powerful basis for analysis of gene expression. Data mining methods such as clustering have been widely applied to microarray data to link genes that sho...
Yong Ye, Xintao Wu, Kalpathi R. Subramanian, Liyin...
This paper describes the design, implementation and deployment of a wireless sensor system for athletes. The system is designed to profile sprints based on input from on-body senso...
Salman Taherian, Marcelo Pias, Robert Harle, Georg...
Various approaches for plagiarism detection exist. All are based on more or less sophisticated text analysis methods such as string matching, fingerprinting or style comparison. I...
Abstract: We report on a model for the interaction of chimeric melanocortin Gprotein coupled receptors with peptide ligands using the rough set approach. Rough sets generate If-The...