Sciweavers

294 search results - page 25 / 59
» Efficient Confirmer Signatures from the
Sort
View
MOBISYS
2008
ACM
14 years 9 months ago
Behavioral detection of malware on mobile handsets
A novel behavioral detection framework is proposed to detect mobile worms, viruses and Trojans, instead of the signature-based solutions currently available for use in mobile devi...
Abhijit Bose, Xin Hu, Kang G. Shin, Taejoon Park
BMCBI
2005
121views more  BMCBI 2005»
13 years 9 months ago
Quality control and quality assessment of data from surface-enhanced laser desorption/ionization (SELDI) time-of flight (TOF) ma
Background: Proteomic profiling of complex biological mixtures by the ProteinChip technology of surfaceenhanced laser desorption/ionization time-of-flight (SELDI-TOF) mass spectro...
Huixiao Hong, Yvonne P. Dragan, Joshua Epstein, Ca...
TSMC
2008
225views more  TSMC 2008»
13 years 9 months ago
Robust Methods for Geometric Primitive Recovery and Estimation From Range Images
We present a method for the recovery of partially occluded 3D geometric primitives from range images which might also include non-primitive objects. The method uses a technique for...
Irina Lavva, Eyal Hameiri, Ilan Shimshoni
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
14 years 10 months ago
Mining optimal decision trees from itemset lattices
We present DL8, an exact algorithm for finding a decision tree that optimizes a ranking function under size, depth, accuracy and leaf constraints. Because the discovery of optimal...
Élisa Fromont, Siegfried Nijssen
BMCBI
2010
127views more  BMCBI 2010»
13 years 10 months ago
Computational prediction of type III secreted proteins from gram-negative bacteria
Background: Type III secretion system (T3SS) is a specialized protein delivery system in gramnegative bacteria that injects proteins (called effectors) directly into the eukaryoti...
Yang Yang, Jiayuan Zhao, Robyn L. Morgan, Wenbo Ma...