Sciweavers

495 search results - page 96 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
BMCBI
2010
182views more  BMCBI 2010»
13 years 7 months ago
Beyond co-localization: inferring spatial interactions between sub-cellular structures from microscopy images
Background: Sub-cellular structures interact in numerous direct and indirect ways in order to fulfill cellular functions. While direct molecular interactions crucially depend on s...
Jo A. Helmuth, Grégory Paul, Ivo F. Sbalzar...
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
14 years 8 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei
RECOMB
2006
Springer
14 years 8 months ago
Efficient Enumeration of Phylogenetically Informative Substrings
We study the problem of enumerating substrings that are common amongst genomes that share evolutionary descent. For example, one might want to enumerate all identical (therefore co...
Stanislav Angelov, Boulos Harb, Sampath Kannan, Sa...
CIKM
2009
Springer
14 years 2 months ago
Multivariate classification of urine metabolome profiles for breast cancer diagnosis
Background: Diagnosis techniques using urine are non-invasive, inexpensive, and easy to perform in clinical settings. The metabolites in urine, as the end products of cellular pro...
Younghoon Kim, Imhoi Koo, Byung Hwa Jung, Bong Chu...
ESCIENCE
2006
IEEE
14 years 1 months ago
Workflow-Driven Ontologies: An Earth Sciences Case Study
A goal of the Geosciences Network (GEON) is to develop cyber-infrastructure that will allow earth scientists to discover access, integrate and disseminate knowledge in distributed...
Leonardo Salayandia, Paulo Pinheiro da Silva, Ann ...