Sciweavers

885 search results - page 122 / 177
» Process Patterns for COTS-Based Development
Sort
View
CSDA
2008
128views more  CSDA 2008»
15 years 2 months ago
Assessing agreement of clustering methods with gene expression microarray data
In the rapidly evolving field of genomics, many clustering and classification methods have been developed and employed to explore patterns in gene expression data. Biologists face...
Xueli Liu, Sheng-Chien Lee, George Casella, Gary F...
IJNSEC
2007
119views more  IJNSEC 2007»
15 years 2 months ago
Evolutionary Design of Intrusion Detection Programs
Intrusion detection is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of intrusions, defined as attempts to compromis...
Ajith Abraham, Crina Grosan, Carlos Martín-...
BMCBI
2004
94views more  BMCBI 2004»
15 years 2 months ago
The MB2 gene family of Plasmodium species has a unique combination of S1 and GTP-binding domains
Background: Identification and characterization of novel Plasmodium gene families is necessary for developing new anti-malarial therapeutics. The products of the Plasmodium falcip...
Lisa C. Romero, Thanh Vinh Nguyen, Benoit Deville,...
112
Voted
KDD
2003
ACM
118views Data Mining» more  KDD 2003»
16 years 2 months ago
Generating English summaries of time series data using the Gricean maxims
We are developing technology for generating English textual summaries of time-series data, in three domains: weather forecasts, gas-turbine sensor readings, and hospital intensive...
Somayajulu Sripada, Ehud Reiter, Jim Hunter, Jin Y...
128
Voted
ACSAC
2008
IEEE
15 years 9 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...