Sciweavers

1356 search results - page 46 / 272
» Analysis of security data from a large computing organizatio...
Sort
View
AVI
2008
13 years 10 months ago
Supporting visual exploration of massive movement data
To make sense from large amounts of movement data (sequences of positions of moving objects), a human analyst needs interactive visual displays enhanced with database operations a...
Natalia V. Andrienko, Gennady L. Andrienko
BMCBI
2006
179views more  BMCBI 2006»
13 years 8 months ago
Accurate and unambiguous tag-to-gene mapping in serial analysis of gene expression
Background: In this study, we present a robust and reliable computational method for tag-togene assignment in serial analysis of gene expression (SAGE). The method relies on curre...
Rodrigo Malig, Cristian Varela, Eduardo Agosin, Fr...
LWA
2007
13 years 10 months ago
Position Paper: Ontology Learning from Folksonomies
The emergence of collaborative tagging systems with their underlying flat and uncontrolled resource organization paradigm has led to a large number of research activities focussi...
Dominik Benz, Andreas Hotho
FC
2010
Springer
171views Cryptology» more  FC 2010»
14 years 11 days ago
The Phish-Market Protocol: Securely Sharing Attack Data between Competitors
A key way in which banks mitigate the effects of phishing is to remove fraudulent websites or suspend abusive domain names. This ‘take-down’ is often subcontracted to special...
Tal Moran, Tyler Moore
BMCBI
2005
134views more  BMCBI 2005»
13 years 8 months ago
Inherited disorder phenotypes: controlled annotation and statistical analysis for knowledge mining from gene lists
Background: Analysis of inherited diseases and their associated phenotypes is of great importance to gain knowledge of underlying genetic interactions and could ultimately give cl...
Marco Masseroli, Osvaldo Galati, Mauro Manzotti, K...