Sciweavers

415 search results - page 75 / 83
» Intruders pattern identification
Sort
View
KDD
2003
ACM
266views Data Mining» more  KDD 2003»
15 years 10 months ago
Applying data mining in investigating money laundering crimes
In this paper, we study the problem of applying data mining to facilitate the investigation of money laundering crimes (MLCs). We have identified a new paradigm of problems --- th...
Zhongfei (Mark) Zhang, John J. Salerno, Philip S. ...
RECOMB
2007
Springer
15 years 10 months ago
Framework for Identifying Common Aberrations in DNA Copy Number Data
High-resolution array comparative genomic hybridization (aCGH) provides exon-level mapping of DNA aberrations in cells or tissues. Such aberrations are central to carcinogenesis an...
Amir Ben-Dor, Doron Lipson, Anya Tsalenko, Mark Re...
RECOMB
2002
Springer
15 years 10 months ago
From promoter sequence to expression: a probabilistic framework
We present a probabilistic framework that models the process by which transcriptional binding explains the mRNA expression of different genes. Our joint probabilistic model unifie...
Eran Segal, Yoseph Barash, Itamar Simon, Nir Fried...
WWW
2010
ACM
15 years 4 months ago
Equip tourists with knowledge mined from travelogues
With the prosperity of tourism and Web 2.0 technologies, more and more people have willingness to share their travel experiences on the Web (e.g., weblogs, forums, or Web 2.0 comm...
Qiang Hao, Rui Cai, Changhu Wang, Rong Xiao, Jiang...
VRST
2005
ACM
15 years 3 months ago
An integrated system: virtual reality, haptics and modern sensing technique (VHS) for post-stroke rehabilitation
In this paper, we introduce an interdisciplinary project, involving researchers from the fields of Physical Therapy, Computer Science, Psychology, Communication and Cell Neurobiol...
Shih-Ching Yeh, Albert A. Rizzo, Weirong Zhu, Jill...