Sciweavers

507 search results - page 50 / 102
» Mining knowledge from databases: an information network anal...
Sort
View
IEEEIAS
2009
IEEE
14 years 2 months ago
Fuzzy Intrusion Detection System via Data Mining Technique with Sequences of System Calls
: There are two main approaches for implementing IDS; Host based and Network based. While the former is implemented in form of software deployed on a host, the latter, usually is b...
Mohammad Akbarpour Sekeh, Mohd. Aizani Bin Maarof
GIR
2007
ACM
13 years 11 months ago
Eliciting concepts of place for text-based image retrieval
This paper describes research being employed in the Tripod project to improve the retrieval of photographs through a comprehensive knowledge of where they were taken. The methods ...
Alistair J. Edwardes, Ross S. Purves
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
14 years 8 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
BMCBI
2005
143views more  BMCBI 2005»
13 years 7 months ago
Evaluation of BioCreAtIvE assessment of task 2
Background: Molecular Biology accumulated substantial amounts of data concerning functions of genes and proteins. Information relating to functional descriptions is generally extr...
Christian Blaschke, Eduardo Andrés Le&oacut...
BMCBI
2010
143views more  BMCBI 2010»
13 years 8 months ago
Learning gene regulatory networks from only positive and unlabeled data
Background: Recently, supervised learning methods have been exploited to reconstruct gene regulatory networks from gene expression data. The reconstruction of a network is modeled...
Luigi Cerulo, Charles Elkan, Michele Ceccarelli