Sciweavers

2705 search results - page 445 / 541
» Privacy in Data Mining Using Formal Methods
Sort
View
ISOLA
2010
Springer
14 years 12 months ago
Semantically-Guided Workflow Construction in Taverna: The SADI and BioMoby Plug-Ins
In the Taverna workflow design and enactment tool, users often find it difficult to both manually discover a service or workflow fragment that executes a desired operation on a pie...
David Withers, Edward A. Kawas, E. Luke McCarthy, ...
BMCBI
2006
95views more  BMCBI 2006»
15 years 2 months ago
A quantitative analysis of secondary RNA structure using domination based parameters on trees
Background: It has become increasingly apparent that a comprehensive database of RNA motifs is essential in order to achieve new goals in genomic and proteomic research. Secondary...
Teresa W. Haynes, Debra J. Knisley, Edith Seier, Y...
CORR
2010
Springer
206views Education» more  CORR 2010»
15 years 2 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
ICCV
2001
IEEE
16 years 3 months ago
Continuous Global Evidence-Based Bayesian Modality Fusion for Simultaneous Tracking of Multiple Objects
Robust, real-time tracking of objects from visual data requires probabilistic fusion of multiple visual cues. Previous approaches have either been ad hoc or relied on a Bayesian n...
Jamie Sherrah, Shaogang Gong
104
Voted
KDD
2002
ACM
147views Data Mining» more  KDD 2002»
16 years 2 months ago
The Impact of Site Structure and User Environment on Session Reconstruction in Web Usage Analysis
The analysis of user behavior on the Web presupposes a reliable reconstruction of the users' navigational activities. Cookies and server-generated session identifiers have be...
Bettina Berendt, Bamshad Mobasher, Miki Nakagawa, ...