Sciweavers

648 search results - page 92 / 130
» Combining Two Data Mining Methods for System Identification
Sort
View
122
Voted
IACR
2011
86views more  IACR 2011»
14 years 2 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf
148
Voted
BMCBI
2007
136views more  BMCBI 2007»
15 years 2 months ago
Prediction of tissue-specific cis-regulatory modules using Bayesian networks and regression trees
Background: In vertebrates, a large part of gene transcriptional regulation is operated by cisregulatory modules. These modules are believed to be regulating much of the tissue-sp...
Xiaoyu Chen, Mathieu Blanchette
125
Voted
CORR
2010
Springer
206views Education» more  CORR 2010»
15 years 2 months ago
Detecting Anomalous Process Behaviour using Second Generation Artificial Immune Systems
Abstract. Artificial immune systems (AISs) are problem-solving systems inspired by the biological immune system. They have been successfully applied to a number of problem domains ...
Jamie Twycross, Uwe Aickelin, Amanda M. Whitbrook
BMCBI
2010
165views more  BMCBI 2010»
15 years 2 months ago
Multivariate meta-analysis of proteomics data from human prostate and colon tumours
Background: There is a vast need to find clinically applicable protein biomarkers as support in cancer diagnosis and tumour classification. In proteomics research, a number of met...
Lina Hultin Rosenberg, Bo Franzén, Gert Aue...
CORR
2006
Springer
96views Education» more  CORR 2006»
15 years 2 months ago
How accurate are the time delay estimates in gravitational lensing?
We present a novel approach to estimate the time delay between light curves of multiple images in a gravitationally lensed system, based on Kernel methods in the context of machine...
Juan C. Cuevas-Tello, Peter Tino, Somak Raychaudhu...