Sciweavers

117 search results - page 19 / 24
» Data Provenance: A Categorization of Existing Approaches
Sort
View
KDD
2009
ACM
173views Data Mining» more  KDD 2009»
15 years 4 months ago
Malware detection using statistical analysis of byte-level file content
Commercial anti-virus software are unable to provide protection against newly launched (a.k.a “zero-day”) malware. In this paper, we propose a novel malware detection techniqu...
S. Momina Tabish, M. Zubair Shafiq, Muddassar Faro...
IVS
2008
121views more  IVS 2008»
14 years 11 months ago
Using treemaps for variable selection in spatio-temporal visualisation
We demonstrate and reflect upon the use of enhanced treemaps that incorporate spatial and temporal ordering for exploring a large multivariate spatio-temporal data set. The result...
Aidan Slingsby, Jason Dykes, Jo Wood
ICFP
2005
ACM
15 years 11 months ago
Associated type synonyms
ML modules and Haskell type classes have proven to be highly effective tools for program structuring. Modules emphasize explicit configuration of program components and the use of...
Manuel M. T. Chakravarty, Gabriele Keller, Simon L...
WWW
2008
ACM
14 years 11 months ago
Discovering co-located queries in geographic search logs
A geographic search request contains a query consisting of one or more keywords, and a search-location that the user searches for. In this paper, we study the problem of discoveri...
Xiangye Xiao, Longhao Wang, Xing Xie, Qiong Luo
BMCBI
2010
117views more  BMCBI 2010»
14 years 11 months ago
Better score function for peptide identification with ETD MS/MS spectra
Background: Tandem mass spectrometry (MS/MS) has become the primary way for protein identification in proteomics. A good score function for measuring the match quality between a p...
Xiaowen Liu, Baozhen Shan, Lei Xin, Bin Ma