Sciweavers

114 search results - page 23 / 23
» Mining Impact-Targeted Activity Patterns in Imbalanced Data
Sort
View
IJNSEC
2008
115views more  IJNSEC 2008»
13 years 9 months ago
Improving Security Through Analysis of Log Files Intersections
The paper discusses our research in development of general and systematic methods for intrusion prevention. The key idea is to use data mining techniques to discover repeated patt...
Kazimierz Kowalski, Mohsen Beheshti
GECCO
2009
Springer
173views Optimization» more  GECCO 2009»
14 years 4 months ago
Creating regular expressions as mRNA motifs with GP to predict human exon splitting
Low correlation between mRNA concentrations measured at different locations for the same exon show many current Ensembl exon definitions are incomplete. Automatically created pa...
William B. Langdon, Joanna Rowsell, Andrew P. Harr...
CIKM
2010
Springer
13 years 8 months ago
Top-Eye: top-k evolving trajectory outlier detection
The increasing availability of large-scale location traces creates unprecedent opportunities to change the paradigm for identifying abnormal moving activities. Indeed, various asp...
Yong Ge, Hui Xiong, Zhi-hua Zhou, Hasan Ozdemir, J...
BIODATAMINING
2008
147views more  BIODATAMINING 2008»
13 years 10 months ago
Neural networks for genetic epidemiology: past, present, and future
During the past two decades, the field of human genetics has experienced an information explosion. The completion of the human genome project and the development of high throughpu...
Alison A. Motsinger-Reif, Marylyn D. Ritchie