Sciweavers

495 search results - page 93 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
BMCBI
2008
132views more  BMCBI 2008»
13 years 7 months ago
Clustering ionic flow blockade toggles with a Mixture of HMMs
Background: Ionic current blockade signal processing, for use in nanopore detection, offers a promising new way to analyze single molecule properties with potential implications f...
Alexander G. Churbanov, Stephen Winters-Hilt
SSDBM
2006
IEEE
197views Database» more  SSDBM 2006»
14 years 1 months ago
InterJoin: Exploiting Indexes and Materialized Views in XPath Evaluation
XML has become the standard for data exchange for a wide variety of applications, particularly in the scientific community. In order to efficiently process queries on XML repres...
Derek Phillips, Ning Zhang 0002, Ihab F. Ilyas, M....
AAI
2007
132views more  AAI 2007»
13 years 7 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
BMCBI
2008
153views more  BMCBI 2008»
13 years 7 months ago
Improved general regression network for protein domain boundary prediction
Background: Protein domains present some of the most useful information that can be used to understand protein structure and functions. Recent research on protein domain boundary ...
Paul D. Yoo, Abdur R. Sikder, Bing Bing Zhou, Albe...
SIGMOD
2002
ACM
132views Database» more  SIGMOD 2002»
14 years 7 months ago
Clustering by pattern similarity in large data sets
Clustering is the process of grouping a set of objects into classes of similar objects. Although definitions of similarity vary from one clustering model to another, in most of th...
Haixun Wang, Wei Wang 0010, Jiong Yang, Philip S. ...