Sciweavers

772 search results - page 138 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
CGF
2008
142views more  CGF 2008»
14 years 11 months ago
Visualizing Genome Expression and Regulatory Network Dynamics in Genomic and Metabolic Context
DNA microarrays are used to measure the expression levels of thousands of genes simultaneously. In a time series experiment, the gene expressions are measured as a function of tim...
Michel A. Westenberg, Sacha A. F. T. van Hijum, Os...
KDD
2006
ACM
155views Data Mining» more  KDD 2006»
16 years 2 days ago
Camouflaged fraud detection in domains with complex relationships
We describe a data mining system to detect frauds that are camouflaged to look like normal activities in domains with high number of known relationships. Examples include accounti...
Sankar Virdhagriswaran, Gordon Dakin
BMCBI
2008
120views more  BMCBI 2008»
14 years 11 months ago
A protein interaction based model for schizophrenia study
Background: Schizophrenia is a complex disease with multiple factors contributing to its pathogenesis. In addition to environmental factors, genetic factors may also increase susc...
Pei-Chun Hsu, Ueng-Cheng Yang, Kuan-Hui Shih, Chih...
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
15 years 4 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
RAID
2005
Springer
15 years 5 months ago
Defending Against Injection Attacks Through Context-Sensitive String Evaluation
Abstract. Injection vulnerabilities pose a major threat to applicationlevel security. Some of the more common types are SQL injection, crosssite scripting and shell injection vulne...
Tadeusz Pietraszek, Chris Vanden Berghe