Sciweavers

2049 search results - page 203 / 410
» Privacy-Preserving Data Mining Systems
Sort
View
83
Voted
BMCBI
2008
95views more  BMCBI 2008»
14 years 11 months ago
Mining protein networks for synthetic genetic interactions
Background: The local connectivity and global position of a protein in a protein interaction network are known to correlate with some of its functional properties, including its e...
Sri R. Paladugu, Shan Zhao, Animesh Ray, Alpan Rav...
KDD
2009
ACM
167views Data Mining» more  KDD 2009»
16 years 5 days ago
SNARE: a link analytic system for graph labeling and risk detection
Classifying nodes in networks is a task with a wide range of applications. It can be particularly useful in anomaly and fraud detection. Many resources are invested in the task of...
Mary McGlohon, Stephen Bay, Markus G. Anderle, Dav...
124
Voted
BMCBI
2005
163views more  BMCBI 2005»
14 years 11 months ago
Alkahest NuclearBLAST: a user-friendly BLAST management and analysis system
Background -: Sequencing of EST and BAC end datasets is no longer limited to large research groups. Drops in per-base pricing have made high throughput sequencing accessible to in...
Stephen E. Diener, Thomas D. Houfek, Sam E. Kalat,...
94
Voted
BPM
2009
Springer
258views Business» more  BPM 2009»
15 years 6 months ago
Activity Mining by Global Trace Segmentation
Process Mining is a technology for extracting non-trivial and useful information from execution logs. For example, there are many process mining techniques to automatically discove...
Christian W. Günther, Anne Rozinat, Wil M. P....
ISMIS
2009
Springer
15 years 6 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...