Sciweavers

1862 search results - page 184 / 373
» Constrained pattern matching
Sort
View
BMCBI
2004
130views more  BMCBI 2004»
15 years 3 months ago
PATTERNFINDER: combined analysis of DNA regulatory sequences and double-helix stability
Background: Regulatory regions that function in DNA replication and gene transcription contain specific sequences that bind proteins as well as less-specific sequences in which th...
Yanlin Huang, David Kowalski
118
Voted
JSC
2010
103views more  JSC 2010»
15 years 1 months ago
Anti-patterns for rule-based languages
Negation is intrinsic to human thinking and most of the time when searching for something, we base our patterns on both positive and negative conditions. This should be naturally ...
Horatiu Cirstea, Claude Kirchner, Radu Kopetz, Pie...
KDD
2002
ACM
144views Data Mining» more  KDD 2002»
16 years 3 months ago
Efficiently mining frequent trees in a forest
Mining frequent trees is very useful in domains like bioinformatics, web mining, mining semi-structured data, and so on. We formulate the problem of mining (embedded) subtrees in ...
Mohammed Javeed Zaki
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
15 years 10 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
AINA
2008
IEEE
15 years 9 months ago
Improved TCAM-Based Pre-Filtering for Network Intrusion Detection Systems
—With the increasing growth of the Internet, the explosion of attacks and viruses significantly affects the network security. Network Intrusion Detection System (NIDS) is develop...
Yeim-Kuan Chang, Ming-Li Tsai, Cheng-Chien Su