Sciweavers

2830 search results - page 565 / 566
» Extraction of informative genes from microarray data
Sort
View
GECCO
2009
Springer
138views Optimization» more  GECCO 2009»
14 years 27 days ago
IMAD: in-execution malware analysis and detection
The sophistication of computer malware is becoming a serious threat to the information technology infrastructure, which is the backbone of modern e-commerce systems. We, therefore...
Syed Bilal Mehdi, Ajay Kumar Tanwani, Muddassar Fa...
BMCBI
2005
107views more  BMCBI 2005»
13 years 6 months ago
Protein subcellular localization prediction for Gram-negative bacteria using amino acid subalphabets and a combination of multip
Background: Predicting the subcellular localization of proteins is important for determining the function of proteins. Previous works focused on predicting protein localization in...
Jiren Wang, Wing-Kin Sung, Arun Krishnan, Kuo-Bin ...
APN
2007
Springer
14 years 15 days ago
ProM 4.0: Comprehensive Support for Real Process Analysis
This tool paper describes the functionality of ProM. Version 4.0 of ProM has been released at the end of 2006 and this version reflects recent achievements in process mining. Proc...
Wil M. P. van der Aalst, Boudewijn F. van Dongen, ...
LAWEB
2006
IEEE
14 years 10 days ago
OWeB: A Framework for Offline Web Browsing
Internet browsing is highly dependent on the real-time network availability and speed. This becomes a significant constraint when browsing over slow and intermittent networks. In ...
Ganesh Ananthanarayanan, Sean Olin Blagsvedt, Kent...
ECOOP
1999
Springer
13 years 10 months ago
Visualizing Reference Patterns for Solving Memory Leaks in Java
Many Java programmers believe they do not have to worry about memory management because of automatic garbage collection. In fact, many Java programs run out of memory unexpectedly ...
Wim De Pauw, Gary Sevitsky