Sciweavers

3086 search results - page 592 / 618
» Generalized Discriminant Analysis Using a Kernel Approach
Sort
View
CSB
2005
IEEE
137views Bioinformatics» more  CSB 2005»
14 years 1 months ago
A Learned Comparative Expression Measure for Affymetrix GeneChip DNA Microarrays
Perhaps the most common question that a microarray study can ask is, “Between two given biological conditions, which genes exhibit changed expression levels?” Existing methods...
Will Sheffler, Eli Upfal, John Sedivy, William Sta...
SIGIR
2005
ACM
14 years 1 months ago
An application of text categorization methods to gene ontology annotation
This paper describes an application of IR and text categorization methods to a highly practical problem in biomedicine, specifically, Gene Ontology (GO) annotation. GO annotation...
Kazuhiro Seki, Javed Mostafa
CCS
2007
ACM
13 years 11 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
DATE
2004
IEEE
152views Hardware» more  DATE 2004»
13 years 11 months ago
A Design Methodology for the Exploitation of High Level Communication Synthesis
In this paper we analyse some methodological concerns that have to be faced in a design flow which contains automatic synthesis phases from high-level, system descriptions. In par...
Francesco Bruschi, Massimo Bombana
ACSAC
2001
IEEE
13 years 11 months ago
Verifiable Identifiers in Middleware Security
fies a number of issues related to security information r semantics on different layers of abstraction. In particular it is difficult to express caller and target accurately in the...
Ulrich Lang, Dieter Gollmann, Rudolf Schreiner