Sciweavers

1608 search results - page 298 / 322
» Challenges in Business Process Analysis
Sort
View
CCS
2010
ACM
13 years 10 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
BMCBI
2010
165views more  BMCBI 2010»
13 years 10 months ago
Bayesian integrated modeling of expression data: a case study on RhoG
Background: DNA microarrays provide an efficient method for measuring activity of genes in parallel and even covering all the known transcripts of an organism on a single array. T...
Rashi Gupta, Dario Greco, Petri Auvinen, Elja Arja...
BMCBI
2010
160views more  BMCBI 2010»
13 years 10 months ago
Identification of functional hubs and modules by converting interactome networks into hierarchical ordering of proteins
Background: Protein-protein interactions play a key role in biological processes of proteins within a cell. Recent high-throughput techniques have generated protein-protein intera...
Young-Rae Cho, Aidong Zhang
BMCBI
2008
219views more  BMCBI 2008»
13 years 10 months ago
Classification of premalignant pancreatic cancer mass-spectrometry data using decision tree ensembles
Background: Pancreatic cancer is the fourth leading cause of cancer death in the United States. Consequently, identification of clinically relevant biomarkers for the early detect...
Guangtao Ge, G. William Wong
BMCBI
2008
242views more  BMCBI 2008»
13 years 10 months ago
annot8r: GO, EC and KEGG annotation of EST datasets
Background: The expressed sequence tag (EST) methodology is an attractive option for the generation of sequence data for species for which no completely sequenced genome is availa...
Ralf Schmid, Mark L. Blaxter