Sciweavers

150 search results - page 15 / 30
» Discovering private trajectories using background informatio...
Sort
View
ACSAC
2000
IEEE
15 years 1 months ago
Introducing Decryption Authority into PKI
It is well-known that CA plays the central role in PKI. In this paper we introduce a new component into PKI, DA (decryption authority), which decrypts important and sensitive mess...
Feng Bao
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
15 years 10 months ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
IADIS
2008
14 years 11 months ago
Empowering Students With Ict Competences
The aim of this paper is to analyze the continuous learning process from the Open Distance Learning Department of the University of Bucharest. We will underline the personal prolu...
Dumitrache Anisoara, Logofatu Bogdan, Gheorghe Mih...
BMCBI
2007
190views more  BMCBI 2007»
14 years 9 months ago
Discriminative motif discovery in DNA and protein sequences using the DEME algorithm
Background: Motif discovery aims to detect short, highly conserved patterns in a collection of unaligned DNA or protein sequences. Discriminative motif finding algorithms aim to i...
Emma Redhead, Timothy L. Bailey
BMCBI
2011
14 years 4 months ago
Pathway-based analysis using reduced gene subsets in genome-wide association studies
Background: Single Nucleotide Polymorphism (SNP) analysis only captures a small proportion of associated genetic variants in Genome-Wide Association Studies (GWAS) partly due to s...
Jingyuan Zhao, Simone Gupta, Mark Seielstad, Jianj...