Sciweavers

834 search results - page 163 / 167
» Quantifying and Measuring Anonymity
Sort
View
136
Voted
BMCBI
2005
136views more  BMCBI 2005»
15 years 3 months ago
Automatic detection of false annotations via binary property clustering
Background: Computational protein annotation methods occasionally introduce errors. Falsepositive (FP) errors are annotations that are mistakenly associated with a protein. Such f...
Noam Kaplan, Michal Linial
164
Voted
BMCBI
2005
94views more  BMCBI 2005»
15 years 3 months ago
Reproducible Clusters from Microarray Research: Whither?
Motivation: In cluster analysis, the validity of specific solutions, algorithms, and procedures present significant challenges because there is no null hypothesis to test and no &...
Nikhil R. Garge, Grier P. Page, Alan P. Sprague, B...
137
Voted
BMCBI
2004
208views more  BMCBI 2004»
15 years 3 months ago
Hybrid clustering for microarray image analysis combining intensity and shape features
Background: Image analysis is the first crucial step to obtain reliable results from microarray experiments. First, areas in the image belonging to single spots have to be identif...
Jörg Rahnenführer, Daniel Bozinov
155
Voted
ESEM
2010
ACM
15 years 2 months ago
Strengthening the empirical analysis of the relationship between Linus' Law and software security
Open source software is often considered to be secure because large developer communities can be leveraged to find and fix security vulnerabilities. Eric Raymond states Linus’ L...
Andrew Meneely, Laurie A. Williams
150
Voted
JCM
2010
119views more  JCM 2010»
15 years 2 months ago
Evaluation of Router Implementations for Explicit Congestion Control Schemes
— Explicit congestion control schemes use router feedback to overcome limitations of the standard mechanisms of the Transmission Control Protocol (TCP). These approaches require ...
Simon Hauger, Michael Scharf, Jochen Kögel, C...