Sciweavers

1446 search results - page 232 / 290
» Exploring Knowledge Bases for Similarity
Sort
View
CSB
2005
IEEE
110views Bioinformatics» more  CSB 2005»
14 years 1 months ago
A Topological Measurement for Weighted Protein Interaction Network
High-throughput methods for detecting protein-protein interactions (PPI) have given researchers an initial global picture of protein interactions on a genomic scale. The usefulnes...
Pengjun Pei, Aidong Zhang
IDEAS
2005
IEEE
165views Database» more  IDEAS 2005»
14 years 1 months ago
Privacy Aware Data Generation for Testing Database Applications
Testing of database applications is of great importance. A significant issue in database application testing consists in the availability of representative data. In this paper we...
Xintao Wu, Chintan Sanghvi, Yongge Wang, Yuliang Z...
SSDBM
2005
IEEE
218views Database» more  SSDBM 2005»
14 years 1 months ago
The "Best K" for Entropy-based Categorical Data Clustering
With the growing demand on cluster analysis for categorical data, a handful of categorical clustering algorithms have been developed. Surprisingly, to our knowledge, none has sati...
Keke Chen, Ling Liu
ICSOC
2005
Springer
14 years 1 months ago
Semantic Caching for Web Services
We present a semantic caching scheme suitable for caching responses from Web services on the SOAP protocol level. Existing semantic caching schemes for database systems or Web sour...
Stefan Seltzsam, Roland Holzhauser, Alfons Kemper
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman