Sciweavers

772 search results - page 140 / 155
» Network Intrusion Detection Using Genetic Clustering
Sort
View
92
Voted
BMCBI
2008
135views more  BMCBI 2008»
14 years 9 months ago
Inferring the role of transcription factors in regulatory networks
Background: Expression profiles obtained from multiple perturbation experiments are increasingly used to reconstruct transcriptional regulatory networks, from well studied, simple...
Philippe Veber, Carito Guziolowski, Michel Le Borg...
70
Voted
BMCBI
2010
132views more  BMCBI 2010»
14 years 9 months ago
Protein network prediction and topological analysis in Leishmania major as a tool for drug target selection
Background: Leishmaniasis is a virulent parasitic infection that causes a worldwide disease burden. Most treatments have toxic side-effects and efficacy has decreased due to the e...
Andrés F. Flórez, Daeui Park, Jong B...
WWW
2010
ACM
15 years 4 months ago
Relational duality: unsupervised extraction of semantic relations between entities on the web
Extracting semantic relations among entities is an important first step in various tasks in Web mining and natural language processing such as information extraction, relation de...
Danushka Bollegala, Yutaka Matsuo, Mitsuru Ishizuk...
INFOCOM
2010
IEEE
14 years 8 months ago
URCA: Pulling out Anomalies by their Root Causes
—Traffic anomaly detection has received a lot of attention over recent years, but understanding the nature of these anomalies and identifying the flows involved is still a manu...
Fernando Silveira, Christophe Diot
84
Voted
CCS
2007
ACM
15 years 3 months ago
Polyglot: automatic extraction of protocol message format using dynamic binary analysis
Protocol reverse engineering, the process of extracting the application-level protocol used by an implementation, without access to the protocol specification, is important for m...
Juan Caballero, Heng Yin, Zhenkai Liang, Dawn Xiao...