Sciweavers

1701 search results - page 304 / 341
» Providing k-anonymity in data mining
Sort
View
AB
2007
Springer
14 years 1 months ago
Algebraic Systems Biology: Theses and Hypotheses
What is systems biology? What can biologists gain from an attempt to algebraize the questions in systems biology? Starting with plausible biological theses, can one algebraically m...
Bud Mishra
ICDM
2006
IEEE
124views Data Mining» more  ICDM 2006»
14 years 1 months ago
Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering
Technologies that use the Internet network to deliver voice communications have the potential to reduce costs and improve access to communications services around the world. Howev...
Olivier Verscheure, Michail Vlachos, Aris Anagnost...
VLDB
2004
ACM
163views Database» more  VLDB 2004»
14 years 23 days ago
Compressing Large Boolean Matrices using Reordering Techniques
Large boolean matrices are a basic representational unit in a variety of applications, with some notable examples being interactive visualization systems, mining large graph struc...
David S. Johnson, Shankar Krishnan, Jatin Chhugani...
PAKDD
2009
ACM
233views Data Mining» more  PAKDD 2009»
13 years 12 months ago
A Kernel Framework for Protein Residue Annotation
Abstract. Over the last decade several prediction methods have been developed for determining structural and functional properties of individual protein residues using sequence and...
Huzefa Rangwala, Christopher Kauffman, George Kary...
KDD
2010
ACM
272views Data Mining» more  KDD 2010»
13 years 11 months ago
Beyond heuristics: learning to classify vulnerabilities and predict exploits
The security demands on modern system administration are enormous and getting worse. Chief among these demands, administrators must monitor the continual ongoing disclosure of sof...
Mehran Bozorgi, Lawrence K. Saul, Stefan Savage, G...