Sciweavers

614 search results - page 122 / 123
» Computational Biomedicine Lab
Sort
View
ISI
2008
Springer
13 years 6 months ago
Probabilistic frameworks for privacy-aware data mining
Often several cooperating parties would like to have a global view of their joint data for various data mining objectives, but cannot reveal the contents of individual records due...
Joydeep Ghosh
IIE
2007
85views more  IIE 2007»
13 years 6 months ago
Half-Baked Logo Microworlds as Boundary Objects in Integrated Design
The paper addresses the problem of fragmentation of the communities involved in the design of digital media for education. It draws on the experience gained at the Educational Tec...
Chronis Kynigos
BMCBI
2005
306views more  BMCBI 2005»
13 years 6 months ago
A method for aligning RNA secondary structures and its application to RNA motif detection
Background: Alignment of RNA secondary structures is important in studying functional RNA motifs. In recent years, much progress has been made in RNA motif finding and structure a...
Jianghui Liu, Jason Tsong-Li Wang, Jun Hu, Bin Tia...
CN
1999
128views more  CN 1999»
13 years 6 months ago
Intrusion detection systems as evidence
: Although the main aim of IDSs is to detect intrusions to prompt evasive measures, a further aim can be to supply evidence in criminal and civil legal proceedings. However the fea...
Peter Sommer
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
13 years 4 months ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang