Sciweavers

2367 search results - page 470 / 474
» Measuring and Comparing Effectiveness of Data Quality Techni...
Sort
View
CCS
2010
ACM
13 years 7 months ago
@spam: the underground on 140 characters or less
In this work we present a characterization of spam on Twitter. We find that 8% of 25 million URLs posted to the site point to phishing, malware, and scams listed on popular blackl...
Chris Grier, Kurt Thomas, Vern Paxson, Michael Zha...
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
BMCBI
2010
137views more  BMCBI 2010»
13 years 7 months ago
BS Seeker: precise mapping for bisulfite sequencing
Background: Bisulfite sequencing using next generation sequencers yields genome-wide measurements of DNA methylation at single nucleotide resolution. Traditional aligners are not ...
Pao-Yang Chen, Shawn Cokus, Matteo Pellegrini
BMCBI
2007
134views more  BMCBI 2007»
13 years 7 months ago
Benchmarking natural-language parsers for biological applications using dependency graphs
Background: Interest is growing in the application of syntactic parsers to natural language processing problems in biology, but assessing their performance is difficult because di...
Andrew B. Clegg, Adrian J. Shepherd
BMCBI
2006
108views more  BMCBI 2006»
13 years 7 months ago
Improved Chou-Fasman method for protein secondary structure prediction
Background: Protein secondary structure prediction is a fundamental and important component in the analytical study of protein structure and functions. The prediction technique ha...
Hang Chen, Fei Gu, Zhengge Huang