Sciweavers

2319 search results - page 459 / 464
» A Method for the Design and Development of Distributed Appli...
Sort
View
SAC
2009
ACM
14 years 1 months ago
GTfold: a scalable multicore code for RNA secondary structure prediction
The prediction of the correct secondary structures of large RNAs is one of the unsolved challenges of computational molecular biology. Among the major obstacles is the fact that a...
Amrita Mathuriya, David A. Bader, Christine E. Hei...
VLDB
2007
ACM
111views Database» more  VLDB 2007»
14 years 24 days ago
Security in Outsourcing of Association Rule Mining
Outsourcing association rule mining to an outside service provider brings several important benefits to the data owner. These include (i) relief from the high mining cost, (ii) m...
Wai Kit Wong, David W. Cheung, Edward Hung, Ben Ka...
GECCO
2010
Springer
254views Optimization» more  GECCO 2010»
13 years 11 months ago
Evolving viral marketing strategies
One method of viral marketing involves seeding certain consumers within a population to encourage faster adoption of the product throughout the entire population. However, determi...
Forrest Stonedahl, William Rand, Uri Wilensky
BMCBI
2007
157views more  BMCBI 2007»
13 years 6 months ago
Impact of image segmentation on high-content screening data quality for SK-BR-3 cells
Background: High content screening (HCS) is a powerful method for the exploration of cellular signalling and morphology that is rapidly being adopted in cancer research. HCS uses ...
Andrew A. Hill, Peter LaPan, Yizheng Li, Steve Han...
KDD
2006
ACM
128views Data Mining» more  KDD 2006»
14 years 7 months ago
On privacy preservation against adversarial data mining
Privacy preserving data processing has become an important topic recently because of advances in hardware technology which have lead to widespread proliferation of demographic and...
Charu C. Aggarwal, Jian Pei, Bo Zhang 0002