Sciweavers

440 search results - page 66 / 88
» Intrusion Detection: A Bioinformatics Approach
Sort
View
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
15 years 3 months ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
ANCS
2009
ACM
14 years 9 months ago
SPC-FA: synergic parallel compact finite automaton to accelerate multi-string matching with low memory
Deterministic Finite Automaton (DFA) is well-known for its constant matching speed in worst case, and widely used in multistring matching, which is a critical technique in high pe...
Junchen Jiang, Yi Tang, Bin Liu, Xiaofei Wang, Yan...
BIBE
2007
IEEE
133views Bioinformatics» more  BIBE 2007»
15 years 6 months ago
Denoising of Array-Based DNA Copy Number Data Using The Dual-tree Complex Wavelet Transform
—Array-based comparative genomic hybridization (array CGH) is a highly efficient technique, allowing the simultaneous measurement of genomic DNA copy number at hundreds or thous...
Nha Nguyen, Heng Huang, Soontorn Oraintara, Yuhang...
BIBE
2006
IEEE
112views Bioinformatics» more  BIBE 2006»
15 years 5 months ago
Finding Correlations in Functionally Equivalent Proteins by Integrating Automated and Visual Data Exploration
The analysis of alignments of functionally equivalent proteins can reveal regularities such as correlated positions or residue patterns which are important to ensure a specific f...
Daniel A. Keim, Daniela Oelke, Royal Truman, Klaus...
WABI
2001
Springer
15 years 4 months ago
A Chemical-Distance-Based Test for Positive Darwinian Selection
There are very few instances in which positive Darwinian selection has been convincingly demonstrated at the molecular level. In this study, we present a novel test for detecting p...
Tal Pupko, Roded Sharan, Masami Hasegawa, Ron Sham...