Sciweavers

29 search results - page 5 / 6
» Considerate Reasoning and the Composite Design Pattern
Sort
View
CSB
2004
IEEE
158views Bioinformatics» more  CSB 2004»
13 years 11 months ago
Algorithms for Association Study Design Using a Generalized Model of Haplotype Conservation
There is considerable interest in computational methods to assist in the use of genetic polymorphism data for locating disease-related genes. Haplotypes, contiguous sets of correl...
Russell Schwartz
ICUIMC
2009
ACM
14 years 2 months ago
PicAChoo: a tool for customizable feature extraction utilizing characteristics of textual data
Although documents have hundreds of thousands of unique words, only a small number of words are significantly useful for intelligent services. For this reason, feature extraction ...
Jaeseok Myung, Jung-Yeon Yang, Sang-goo Lee
BMCBI
2005
115views more  BMCBI 2005»
13 years 7 months ago
Graphical representation of ribosomal RNA probe accessibility data using ARB software package
Background: Taxon specific hybridization probes in combination with a variety of commonly used hybridization formats nowadays are standard tools in microbial identification. A fre...
Yadhu Kumar, Ralf Westram, Sebastian Behrens, Bern...
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
MMMACNS
2010
Springer
13 years 6 months ago
Group-Centric Models for Secure and Agile Information Sharing
Abstract. To share information and retain control (share-but-protect) is a classic cyber security problem for which effective solutions continue to be elusive. Where the patterns o...
Ravi S. Sandhu, Ram Krishnan, Jianwei Niu, William...