Sciweavers

1561 search results - page 103 / 313
» Evaluating different methods of microarray data normalizatio...
Sort
View
ACSAC
2001
IEEE
15 years 6 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
151
Voted
BMCBI
2010
149views more  BMCBI 2010»
15 years 2 months ago
A multifactorial analysis of obesity as CVD risk factor: Use of neural network based methods in a nutrigenetics context
Background: Obesity is a multifactorial trait, which comprises an independent risk factor for cardiovascular disease (CVD). The aim of the current work is to study the complex eti...
Ioannis K. Valavanis, Stavroula G. Mougiakakou, Ke...
ICDE
2009
IEEE
160views Database» more  ICDE 2009»
15 years 1 days ago
Perm: Processing Provenance and Data on the Same Data Model through Query Rewriting
Data provenance is information that describes how a given data item was produced. The provenance includes source and intermediate data as well as the transformations involved in pr...
Boris Glavic, Gustavo Alonso
127
Voted
BMCBI
2007
138views more  BMCBI 2007»
15 years 2 months ago
A systematic approach to detecting transcription factors in response to environmental stresses
Background: Eukaryotic cells have developed mechanisms to respond to external environmental or physiological changes (stresses). In order to increase the activities of stress-prot...
Li-Hsieh Lin, Hsiao-Ching Lee, Wen-Hsiung Li, Bor-...
BMEI
2009
IEEE
15 years 3 months ago
An Improved Probabilistic Model for Finding Differential Gene Expression
Abstract--Finding differentially expressed genes is a fundamental objective of a microarray experiment. Recently proposed method, PPLR, considers the probe-level measurement error ...
Li Zhang, Xuejun Liu