Sciweavers

1562 search results - page 272 / 313
» Convenience Over Correctness
Sort
View
RECOMB
2007
Springer
15 years 3 months ago
Nucleosome Occupancy Information Improves de novo Motif Discovery
A complete understanding of transcriptional regulatory processes in the cell requires identification of transcription factor binding sites on a genomewide scale. Unfortunately, th...
Leelavati Narlikar, Raluca Gordân, Alexander...
SPIN
2007
Springer
15 years 3 months ago
Tutorial: Parallel Model Checking
d Abstract) Luboˇs Brim and Jiˇr´ı Barnat Faculty of Informatics, Masaryk University, Brno, Czech Republic With the increase in the complexity of computer systems, it becomes e...
Lubos Brim, Jiri Barnat
VLDB
2007
ACM
111views Database» more  VLDB 2007»
15 years 3 months ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
WILF
2007
Springer
170views Fuzzy Logic» more  WILF 2007»
15 years 3 months ago
Time-Series Alignment by Non-negative Multiple Generalized Canonical Correlation Analysis
Background: Quantitative analysis of differential protein expressions requires to align temporal elution measurements from liquid chromatography coupled to mass spectrometry (LC/M...
Bernd Fischer, Volker Roth, Joachim M. Buhmann
ACSAC
2006
IEEE
15 years 3 months ago
How to Automatically and Accurately Sandbox Microsoft IIS
Comparing the system call sequence of a network application against a sandboxing policy is a popular approach to detecting control-hijacking attack, in which the attacker exploits...
Wei Li, Lap-Chung Lam, Tzi-cker Chiueh