Sciweavers

297 search results - page 32 / 60
» Heap Reference Analysis Using Access Graphs
Sort
View
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
16 years 2 months ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
122
Voted
TSE
2008
128views more  TSE 2008»
15 years 2 months ago
Analyzing Regulatory Rules for Privacy and Security Requirements
Information practices that use personal, financial, and health-related information are governed by US laws and regulations to prevent unauthorized use and disclosure. To ensure com...
Travis D. Breaux, Annie I. Antón
BMCBI
2008
102views more  BMCBI 2008»
15 years 2 months ago
mtDNAmanager: a Web-based tool for the management and quality analysis of mitochondrial DNA control-region sequences
Background: For the past few years, scientific controversy has surrounded the large number of errors in forensic and literature mitochondrial DNA (mtDNA) data. However, recent res...
Hwan Young Lee, Injee Song, Eunho Ha, Sung-Bae Cho...
130
Voted
RECOMB
2006
Springer
16 years 2 months ago
Assessing Significance of Connectivity and Conservation in Protein Interaction Networks
Computational and comparative analysis of protein-protein interaction (PPI) networks enable understanding of the modular organization of the cell through identification of functio...
Mehmet Koyutürk, Ananth Grama, Wojciech Szpan...
TISSEC
2010
142views more  TISSEC 2010»
14 years 9 months ago
A logical specification and analysis for SELinux MLS policy
The SELinux mandatory access control (MAC) policy has recently added a multi-level security (MLS) model which is able to express a fine granularity of control over a subject'...
Boniface Hicks, Sandra Rueda, Luke St. Clair, Tren...