Sciweavers

566 search results - page 103 / 114
» Detecting and Identifying Network Anomalies by Component Ana...
Sort
View
TKDE
2008
125views more  TKDE 2008»
14 years 11 months ago
Discovering and Explaining Abnormal Nodes in Semantic Graphs
An important problem in the area of homeland security is to identify abnormal or suspicious entities in large datasets. Although there are methods from data mining and social netwo...
Shou-de Lin, Hans Chalupsky
BMCBI
2007
111views more  BMCBI 2007»
14 years 11 months ago
Modular co-evolution of metabolic networks
Background: The architecture of biological networks has been reported to exhibit high level of modularity, and to some extent, topological modules of networks overlap with known f...
Jing Zhao, Guohui Ding, Lin Tao, Hong Yu, Zhong-Ha...
BMCBI
2007
145views more  BMCBI 2007»
14 years 11 months ago
Colony size measurement of the yeast gene deletion strains for functional genomics
Background: Numerous functional genomics approaches have been developed to study the model organism yeast, Saccharomyces cerevisiae, with the aim of systematically understanding t...
Negar Memarian, Matthew Jessulat, Javad Alirezaie,...
BMCBI
2010
105views more  BMCBI 2010»
14 years 11 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris
MOBIHOC
2005
ACM
15 years 11 months ago
Least privilege and privilege deprivation: towards tolerating mobile sink compromises in wireless sensor networks
Mobile sinks are needed in many sensor network applications for efficient data collection, data querying, localized sensor reprogramming, identifying and revoking compromised sens...
Wensheng Zhang, Hui Song, Sencun Zhu, Guohong Cao