Sciweavers

1405 search results - page 274 / 281
» Popularity at Minimum Cost
Sort
View
CCS
2010
ACM
13 years 8 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
ICA
2010
Springer
13 years 8 months ago
Probabilistic Latent Tensor Factorization
We develop a probabilistic modeling framework for multiway arrays. Our framework exploits the link between graphical models and tensor factorization models and it can realize any ...
Y. Kenan Yilmaz, A. Taylan Cemgil
BMCBI
2007
185views more  BMCBI 2007»
13 years 8 months ago
GEDI: a user-friendly toolbox for analysis of large-scale gene expression data
Background: Several mathematical and statistical methods have been proposed in the last few years to analyze microarray data. Most of those methods involve complicated formulas, a...
André Fujita, João Ricardo Sato, Car...
BMCBI
2007
62views more  BMCBI 2007»
13 years 8 months ago
Missing channels in two-colour microarray experiments: Combining single-channel and two-channel data
Background: There are mechanisms, notably ozone degradation, that can damage a single channel of two-channel microarray experiments. Resulting analyses therefore often choose betw...
Andy G. Lynch, David E. Neal, John D. Kelly, Glyn ...
BMCBI
2008
103views more  BMCBI 2008»
13 years 8 months ago
TOPS++FATCAT: Fast flexible structural alignment using constraints derived from TOPS+ Strings Model
Background: Protein structure analysis and comparison are major challenges in structural bioinformatics. Despite the existence of many tools and algorithms, very few of them have ...
Mallika Veeramalai, Yuzhen Ye, Adam Godzik