Sciweavers

2236 search results - page 315 / 448
» Intrusion detection techniques and approaches
Sort
View
CLEIEJ
2006
126views more  CLEIEJ 2006»
13 years 9 months ago
Software Based Fault Tolerance against Byzantine Failures
The proposed software technique is a very low cost and an effective solution towards designing Byzantine fault tolerant computing application systems that are not so safety critic...
Goutam Kumar Saha
IJDMB
2008
117views more  IJDMB 2008»
13 years 9 months ago
Scoring and summarising gene product clusters using the Gene Ontology
: We propose an approach for quantifying the biological relatedness between gene products, based on their properties, and measure their similarities using exclusively statistical N...
Spiridon C. Denaxas, Christos Tjortjis
CG
2007
Springer
13 years 9 months ago
Visual text mining using association rules
In many situations, individuals or groups of individuals are faced with the need to examine sets of documents to achieve understanding of their structure and to locate relevant in...
Alneu de Andrade Lopes, Roberto Pinho, Fernando Vi...
ACL
2010
13 years 7 months ago
Hierarchical Sequential Learning for Extracting Opinions and Their Attributes
Automatic opinion recognition involves a number of related tasks, such as identifying the boundaries of opinion expression, determining their polarity, and determining their inten...
Yejin Choi, Claire Cardie
BMCBI
2006
114views more  BMCBI 2006»
13 years 9 months ago
BLISS: biding site level identification of shared signal-modules in DNA regulatory sequences
Background: Regulatory modules are segments of the DNA that control particular aspects of gene expression. Their identification is therefore of great importance to the field of mo...
Hailong Meng, Arunava Banerjee, Lei Zhou