Sciweavers

6583 search results - page 215 / 1317
» Semantic Analysis Patterns
Sort
View
125
Voted
ANSS
2004
IEEE
15 years 7 months ago
Normalizing Traffic Pattern with Anonymity for Mission Critical Applications
Intruders often want to analyze traffic pattern to get information for his some malicious activities in ultra-secure network. This paper presents a general approach to prevent tra...
Dongxi Liu, Chi-Hung Chi, Ming Li
134
Voted
BICOB
2010
Springer
15 years 3 months ago
Integrative Biomarker Discovery for Breast Cancer Metastasis from Gene Expression and Protein Interaction Data Using Error-toler
Biomarker discovery for complex diseases is a challenging problem. Most of the existing approaches identify individual genes as disease markers, thereby missing the interactions a...
Rohit Gupta, Smita Agrawal, Navneet Rao, Ze Tian, ...
148
Voted
JBI
2008
137views Bioinformatics» more  JBI 2008»
15 years 3 months ago
Mining sequential patterns for protein fold recognition
Protein data contain discriminative patterns that can be used in many beneficial applications if they are defined correctly. In this work sequential pattern mining (SPM) is utiliz...
Themis P. Exarchos, Costas Papaloukas, Christos La...
120
Voted
INFSOF
2007
83views more  INFSOF 2007»
15 years 3 months ago
On the design of more secure software-intensive systems by use of attack patterns
Retrofitting security implementations to a released software-intensive system or to a system under development may require significant architectural or coding changes. These late...
Michael Gegick, Laurie Williams
119
Voted
SIAMADS
2010
105views more  SIAMADS 2010»
14 years 10 months ago
Nonlinear Patterns in Urban Crime: Hotspots, Bifurcations, and Suppression
We present a weakly nonlinear analysis of our recently developed model for the formation of crime patterns. Using a perturbative approach, we find amplitude equations that govern t...
Martin B. Short, Andrea L. Bertozzi, P. J. Brantin...