Sciweavers

1274 search results - page 174 / 255
» Combined Data Mining Approach for Intrusion Detection
Sort
View
VLDB
2004
ACM
111views Database» more  VLDB 2004»
15 years 9 months ago
Technology Challenges in a Data Warehouse
This presentation will discuss several database technology challenges that are faced when building a data warehouse. It will touch on the challenges posed by high capacity drives ...
Ramesh Bhashyam
BMCBI
2007
102views more  BMCBI 2007»
15 years 4 months ago
A mixture of feature experts approach for protein-protein interaction prediction
High-throughput methods can directly detect the set of interacting proteins in yeast but the results are often incomplete and exhibit high false positive and false negative rates....
Yanjun Qi, Judith Klein-Seetharaman, Ziv Bar-Josep...
WWW
2011
ACM
14 years 11 months ago
Automatic construction of a context-aware sentiment lexicon: an optimization approach
The explosion of Web opinion data has made essential the need for automatic tools to analyze and understand people’s sentiments toward different topics. In most sentiment analy...
Yue Lu, Malú Castellanos, Umeshwar Dayal, C...
AIPS
2003
15 years 5 months ago
A Multi-Agent System-driven AI Planning Approach to Biological Pathway Discovery
As genomic and proteomic data is collected from highthroughput methods on a daily basis, subcellular components are identified and their in vitro behavior is characterized. Howev...
Salim Khan, William Gillis, Carl Schmidt, Keith De...
MSR
2006
ACM
15 years 10 months ago
Detecting similar Java classes using tree algorithms
Similarity analysis of source code is helpful during development to provide, for instance, better support for code reuse. Consider a development environment that analyzes code whi...
Tobias Sager, Abraham Bernstein, Martin Pinzger, C...