Sciweavers

7596 search results - page 1514 / 1520
» Challenges in forensic computing
Sort
View
INFOCOM
2011
IEEE
13 years 1 months ago
A cross-domain privacy-preserving protocol for cooperative firewall optimization
—Firewalls have been widely deployed on the Internet for securing private networks. A firewall checks each incoming or outgoing packet to decide whether to accept or discard the...
Fei Chen, Bezawada Bruhadeshwar, Alex X. Liu
IPMI
2011
Springer
13 years 1 months ago
Globally Optimal Tumor Segmentation in PET-CT Images: A Graph-Based Co-segmentation Method
Tumor segmentation in PET and CT images is notoriously challenging due to the low spatial resolution in PET and low contrast in CT images. In this paper, we proposed a general fram...
Dongfeng Han, John E. Bayouth, Qi Song, Aakant Tau...
NAR
2011
214views Computer Vision» more  NAR 2011»
13 years 20 days ago
starBase: a database for exploring microRNA-mRNA interaction maps from Argonaute CLIP-Seq and Degradome-Seq data
MicroRNAs (miRNAs) represent an important class of small non-coding RNAs (sRNAs) that regulate gene expression by targeting messenger RNAs. However, assigning miRNAs to their regu...
Jian-Hua Yang, Jun-Hao Li, Peng Shao, Hui Zhou, Yu...
NAR
2011
212views Computer Vision» more  NAR 2011»
13 years 20 days ago
The Sequence Read Archive
The combination of significantly lower cost and increased speed of sequencing has resulted in an explosive growth of data submitted into the primary next-generation sequence data ...
Rasko Leinonen, Hideaki Sugawara, Martin Shumway
PAKDD
2011
ACM
419views Data Mining» more  PAKDD 2011»
13 years 19 days ago
DISC: Data-Intensive Similarity Measure for Categorical Data
Abstract. The concept of similarity is fundamentally important in almost every scientific field. Clustering, distance-based outlier detection, classification, regression and sea...
Aditya Desai, Himanshu Singh, Vikram Pudi
« Prev « First page 1514 / 1520 Last » Next »