Sciweavers

1937 search results - page 339 / 388
» Rule Based Updates on Simple Knowledge Bases
Sort
View
VIZSEC
2004
Springer
15 years 7 months ago
Managing attack graph complexity through visual hierarchical aggregation
We describe a framework for managing network attack graph complexity through interactive visualization, which includes hierarchical aggregation of graph elements. Aggregation coll...
Steven Noel, Sushil Jajodia
TC
1998
15 years 3 months ago
Propagating Integrity Information among Interrelated Databases
Data integrity policies often require that quality and integrity metadata be generated and communicated to potential users. However, in data warehouses, federations, and other mul...
Arnon Rosenthal, Edward Sciore
BMCBI
2008
107views more  BMCBI 2008»
15 years 2 months ago
Probe-specific mixed-model approach to detect copy number differences using multiplex ligation-dependent probe amplification (ML
Background: MLPA method is a potentially useful semi-quantitative method to detect copy number alterations in targeted regions. In this paper, we propose a method for the normaliz...
Juan R. González, Josep L. Carrasco, Llu&ia...
BMCBI
2004
121views more  BMCBI 2004»
15 years 1 months ago
DEDB: a database of Drosophila melanogaster exons in splicing graph form
Background: A wealth of quality genomic and mRNA/EST sequences in recent years has provided the data required for large-scale genome-wide analysis of alternative splicing. We have...
Bernett T. K. Lee, Tin Wee Tan, Shoba Ranganathan
222
Voted
AIEDAM
2011
14 years 9 months ago
Discovering implicit constraints in design
In familiar design domains, expert designers are able to quickly focus on “good designs”, based on constraints they have learned while exploring the design space. This ability ...
Madan Mohan Dabbeeru, Amitabha Mukerjee