Sciweavers

294 search results - page 25 / 59
» Efficient Confirmer Signatures from the
Sort
View
MOBISYS
2008
ACM
16 years 1 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
BMCBI
2005
121views more  BMCBI 2005»
15 years 1 months ago
Quality control and quality assessment of data from surface-enhanced laser desorption/ionization (SELDI) time-of flight (TOF) ma
Background: Proteomic profiling of complex biological mixtures by the ProteinChip technology of surfaceenhanced laser desorption/ionization time-of-flight (SELDI-TOF) mass spectro...
Huixiao Hong, Yvonne P. Dragan, Joshua Epstein, Ca...
175
Voted
TSMC
2008
225views more  TSMC 2008»
15 years 1 months ago
Robust Methods for Geometric Primitive Recovery and Estimation From Range Images
We present a method for the recovery of partially occluded 3D geometric primitives from range images which might also include non-primitive objects. The method uses a technique for...
Irina Lavva, Eyal Hameiri, Ilan Shimshoni
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
16 years 2 months ago
Mining optimal decision trees from itemset lattices
We present DL8, an exact algorithm for finding a decision tree that optimizes a ranking function under size, depth, accuracy and leaf constraints. Because the discovery of optimal...
Élisa Fromont, Siegfried Nijssen
BMCBI
2010
127views more  BMCBI 2010»
15 years 2 months ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...