Sciweavers

648 search results - page 88 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
114
Voted
ICDM
2007
IEEE
135views Data Mining» more  ICDM 2007»
15 years 8 months ago
Private Inference Control for Aggregate Database Queries
Data security is a critical issue for many organizations. Sensitive data must be protected from both inside and outside attackers. Access control policies and related mechanisms h...
Geetha Jagannathan, Rebecca N. Wright
BMCBI
2010
154views more  BMCBI 2010»
15 years 2 months ago
An eScience-Bayes strategy for analyzing omics data
Background: The omics fields promise to revolutionize our understanding of biology and biomedicine. However, their potential is compromised by the challenge to analyze the huge da...
Martin Eklund, Ola Spjuth, Jarl E. S. Wikberg
TCBB
2008
137views more  TCBB 2008»
15 years 2 months ago
Toward Verified Biological Models
The last several decades have witnessed a vast accumulation of biological data and data analysis. Many of these data sets represent only a small fraction of the system's behav...
Avital Sadot, Jasmin Fisher, Dan Barak, Yishai Adm...
WSC
2008
15 years 4 months ago
Data Farming around the world overview
Data Farming combines the rapid prototyping capability inherent in certain simulation models with the exploratory power of high performance computing to rapidly generate insight i...
Gary E. Horne, Klaus-Peter Schwierz
KDD
2010
ACM
304views Data Mining» more  KDD 2010»
15 years 28 days ago
Automatic malware categorization using cluster ensemble
Malware categorization is an important problem in malware analysis and has attracted a lot of attention of computer security researchers and anti-malware industry recently. Todayâ...
Yanfang Ye, Tao Li, Yong Chen, Qingshan Jiang