Sciweavers

3651 search results - page 659 / 731
» Data Mining for Security Applications
Sort
View
110
Voted
BMCBI
2008
144views more  BMCBI 2008»
15 years 24 days ago
WGCNA: an R package for weighted correlation network analysis
Background: Correlation networks are increasingly being used in bioinformatics applications. For example, weighted gene co-expression network analysis is a systems biology method ...
Peter Langfelder, Steve Horvath
92
Voted
DATAMINE
2006
89views more  DATAMINE 2006»
15 years 21 days ago
Scalable Clustering Algorithms with Balancing Constraints
Clustering methods for data-mining problems must be extremely scalable. In addition, several data mining applications demand that the clusters obtained be balanced, i.e., be of ap...
Arindam Banerjee, Joydeep Ghosh
81
Voted
PVLDB
2008
99views more  PVLDB 2008»
15 years 4 days ago
Industry-scale duplicate detection
Duplicate detection is the process of identifying multiple representations of a same real-world object in a data source. Duplicate detection is a problem of critical importance in...
Melanie Weis, Felix Naumann, Ulrich Jehle, Jens Lu...
146
Voted
BMCBI
2011
14 years 4 months ago
Cell Subset Prediction for Blood Genomic Studies
Background: Genome-wide transcriptional profiling of patient blood samples offers a powerful tool to investigate underlying disease mechanisms and personalized treatment decisions...
Christopher R. Bolen, Mohamed Uduman, Steven H. Kl...
122
Voted
DSS
2002
220views more  DSS 2002»
15 years 14 days ago
Past, present, and future of decision support technology
Since the early 1970s, decision support systems (DSS) technology and applications have evolved significantly. Many technological and organizational developments have exerted an im...
J. P. Shim, Merrill Warkentin, James F. Courtney, ...