Sciweavers

1179 search results - page 230 / 236
» Modeling Time in Computing: A Taxonomy and a Comparative Sur...
Sort
View
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...
CSB
2004
IEEE
135views Bioinformatics» more  CSB 2004»
13 years 11 months ago
Selection of Patient Samples and Genes for Outcome Prediction
Gene expression profiles with clinical outcome data enable monitoring of disease progression and prediction of patient survival at the molecular level. We present a new computatio...
Huiqing Liu, Jinyan Li, Limsoon Wong
BMCBI
2010
118views more  BMCBI 2010»
13 years 8 months ago
svdPPCS: an effective singular value decomposition-based method for conserved and divergent co-expression gene module identifica
Background: Comparative analysis of gene expression profiling of multiple biological categories, such as different species of organisms or different kinds of tissue, promises to e...
Wensheng Zhang, Andrea Edwards, Wei Fan, Dongxiao ...
PAMI
2002
150views more  PAMI 2002»
13 years 7 months ago
Object Tracking with Bayesian Estimation of Dynamic Layer Representations
Decomposing video frames into coherent two-dimensional motion layers is a powerful method for representing videos. Such a representation provides an intermediate description that e...
Hai Tao, Harpreet S. Sawhney, Rakesh Kumar
WWW
2011
ACM
13 years 2 months ago
Limiting the spread of misinformation in social networks
In this work, we study the notion of competing campaigns in a social network. By modeling the spread of influence in the presence of competing campaigns, we provide necessary too...
Ceren Budak, Divyakant Agrawal, Amr El Abbadi