Sciweavers

224 search results - page 35 / 45
» Interactive anonymization of sensitive data
Sort
View
CHIMIT
2007
ACM
14 years 29 days ago
Looking for trouble: understanding end-user security management
End users are often cast as the weak link in computer security; they fall victim to social engineering and tend to know very little about security technology and policies. This pa...
Joshua B. Gross, Mary Beth Rosson
BMCBI
2008
201views more  BMCBI 2008»
13 years 9 months ago
A copula method for modeling directional dependence of genes
Background: Genes interact with each other as basic building blocks of life, forming a complicated network. The relationship between groups of genes with different functions can b...
Jong-Min Kim, Yoon-Sung Jung, Engin A. Sungur, Kap...
BMCBI
2007
112views more  BMCBI 2007»
13 years 9 months ago
Integrated olfactory receptor and microarray gene expression databases
Background: Gene expression patterns of olfactory receptors (ORs) are an important component of the signal encoding mechanism in the olfactory system since they determine the inte...
Nian Liu, Chiquito J. Crasto, Minghong Ma
IDEAL
2004
Springer
14 years 2 months ago
Building Genetic Networks for Gene Expression Patterns
Building genetic regulatory networks from time series data of gene expression patterns is an important topic in bioinformatics. Probabilistic Boolean networks (PBNs) have been deve...
Wai-Ki Ching, Eric S. Fung, Michael K. Ng
NSDI
2007
13 years 11 months ago
TightLip: Keeping Applications from Spilling the Beans
Access control misconfigurations are widespread and can result in damaging breaches of confidentiality. This paper presents TightLip, a privacy management system that helps user...
Aydan R. Yumerefendi, Benjamin Mickle, Landon P. C...