Sciweavers

98 search results - page 13 / 20
» RIBOWEB: Linking Structural Computations to a Knowledge Base...
Sort
View
SIGMOD
2008
ACM
89views Database» more  SIGMOD 2008»
14 years 7 months ago
Towards identity anonymization on graphs
The proliferation of network data in various application domains has raised privacy concerns for the individuals involved. Recent studies show that simply removing the identities ...
Kun Liu, Evimaria Terzi
BMCBI
2008
160views more  BMCBI 2008»
13 years 7 months ago
Predicting cancer involvement of genes from heterogeneous data
Background: Systematic approaches for identifying proteins involved in different types of cancer are needed. Experimental techniques such as microarrays are being used to characte...
Ramon Aragues, Chris Sander, Baldo Oliva
BMCBI
2005
187views more  BMCBI 2005»
13 years 7 months ago
JAtlasView: a Java atlas-viewer for browsing biomedical 3D images and atlases
Background: Many three-dimensional (3D) images are routinely collected in biomedical research and a number of digital atlases with associated anatomical and other information have...
Guangjie Feng, Nick Burton, Bill Hill, Duncan Davi...
KDD
2006
ACM
156views Data Mining» more  KDD 2006»
14 years 7 months ago
Detecting outliers using transduction and statistical testing
Outlier detection can uncover malicious behavior in fields like intrusion detection and fraud analysis. Although there has been a significant amount of work in outlier detection, ...
Daniel Barbará, Carlotta Domeniconi, James ...
NSPW
2004
ACM
14 years 23 days ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman