Sciweavers

8294 search results - page 82 / 1659
» Presenting Data from Experiments in Algorithmics
Sort
View
ACSAC
2002
IEEE
15 years 7 months ago
Protecting Data from Malicious Software
Corruption or disclosure of sensitive user documents can be among the most lasting and costly effects of malicious software attacks. Many malicious programs specifically target fi...
Matthew Schmid, Frank Hill, Anup K. Ghosh
122
Voted
BMCBI
2010
118views more  BMCBI 2010»
15 years 2 months ago
Identifying differentially regulated subnetworks from phosphoproteomic data
Background: Various high throughput methods are available for detecting regulations at the level of transcription, translation or posttranslation (e.g. phosphorylation). Integrati...
Martin Klammer, Klaus Godl, Andreas Tebbe, Christo...
KDD
2008
ACM
137views Data Mining» more  KDD 2008»
16 years 3 months ago
Learning classifiers from only positive and unlabeled data
The input to an algorithm that learns a binary classifier normally consists of two sets of examples, where one set consists of positive examples of the concept to be learned, and ...
Charles Elkan, Keith Noto
122
Voted
MICCAI
2003
Springer
16 years 3 months ago
Determination of the Mechanical Properties of Soft Human Tissues through Aspiration Experiments
Mechanical models for soft human organs are necessary for a variety of medical applications, such as surgical planning, virtual reality surgery simulators, and for diagnostic purpo...
Alessandro Nava, Edoardo Mazza, Frederic Kleinerma...
128
Voted
CHI
2005
ACM
16 years 3 months ago
Automating the detection of breaks in continuous user experience with computer games
This paper describes an approach towards automating the identification of design problems with three-dimensional mediated or gaming environments through the capture and query of u...
Tim Marsh, Kiyoung Yang, Cyrus Shahabi, Wee Ling W...