The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
Conventional image processing algorithms used to compare images are very timeconsuming, making them inappropriate for use in searching for an image in a huge collection of images ...
Caetano Traina Jr., Agma J. M. Traina, Rildo R. do...
Background: Assessing the outcome of motif mining algorithms is an essential task, as the number of reported motifs can be very large. Significance measures play a central role in...
Motivation: Transcriptional regulatory network (TRN) discovery from one method (e.g. microarray analysis, gene ontology, phylogenic similarity) does not seem feasible due to lack ...
Jingjun Sun, Kagan Tuncay, Alaa Abi Haidar, Lisa E...
Background: In many microarray experiments, analysis is severely hindered by a major difficulty: the small number of samples for which expression data has been measured. When one ...