Sciweavers

2248 search results - page 240 / 450
» Using Bayesian networks to analyze expression data
Sort
View
DMIN
2009
144views Data Mining» more  DMIN 2009»
15 years 1 months ago
Fish or Shark - Data Mining Online Poker
In this paper, data mining techniques are used to analyze data gathered from online poker. The study focuses on short-handed Texas Hold'em, and the data sets used contain thou...
Ulf Johansson, Cecilia Sönströd
150
Voted
ICDE
2012
IEEE
240views Database» more  ICDE 2012»
13 years 6 months ago
Ego-centric Graph Pattern Census
—There is increasing interest in analyzing networks of all types including social, biological, sensor, computer, and transportation networks. Broadly speaking, we may be interest...
Walaa Eldin Moustafa, Amol Deshpande, Lise Getoor
142
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 7 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
121
Voted
BMCBI
2006
133views more  BMCBI 2006»
15 years 3 months ago
Web-based analysis of the mouse transcriptome using Genevestigator
Background: Gene function analysis often requires a complex and laborious sequence of laboratory and computer-based experiments. Choosing an effective experimental design generall...
Oliver Laule, Matthias Hirsch-Hoffmann, Tomas Hruz...
122
Voted
WCNC
2008
IEEE
15 years 10 months ago
Analysis of Interference Effects in MB-OFDM UWB Systems
Abstract— The inter-modulation and cross-modulation products of interferences introduced by nonlinearities of the receiver could significantly degrade system performance, and sh...
Yanmei Li, Jan M. Rabaey, Alberto L. Sangiovanni-V...