Sciweavers

3172 search results - page 523 / 635
» New developments of the Z-EDM algorithm
Sort
View
BMCBI
2006
85views more  BMCBI 2006»
13 years 8 months ago
SVM-based prediction of caspase substrate cleavage sites
Background: Caspases belong to a class of cysteine proteases which function as critical effectors in apoptosis and inflammation by cleaving substrates immediately after unique sit...
Lawrence J. K. Wee, Tin Wee Tan, Shoba Ranganathan
IDA
2008
Springer
13 years 8 months ago
Symbolic methodology for numeric data mining
Currently statistical and artificial neural network methods dominate in data mining applications. Alternative relational (symbolic) data mining methods have shown their effectivene...
Boris Kovalerchuk, Evgenii Vityaev
CORR
2006
Springer
147views Education» more  CORR 2006»
13 years 8 months ago
ARQ Diversity in Fading Random Access Channels
A cross-layer optimization approach is adopted for the design of symmetric random access wireless systems. Instead of the traditional collision model, a more realistic physical la...
Young-Han Nam, Praveen Kumar Gopala, Hesham El Gam...
GEOINFORMATICA
2006
102views more  GEOINFORMATICA 2006»
13 years 8 months ago
Mining Co-Location Patterns with Rare Events from Spatial Data Sets
Abstract A co-location pattern is a group of spatial features/events that are frequently co-located in the same region. For example, human cases of West Nile Virus often occur in r...
Yan Huang, Jian Pei, Hui Xiong
CN
2007
80views more  CN 2007»
13 years 8 months ago
A queueing analysis for the denial of service (DoS) attacks in computer networks
In most network security analysis, researchers mainly focus on qualitative studies on security schemes and possible attacks, and there are few papers on quantitative analysis in t...
Yang Wang, Chuang Lin, Quan-Lin Li, Yuguang Fang