Sciweavers

128 search results - page 17 / 26
» The Boundary Between Privacy and Utility in Data Publishing
Sort
View
ACSAC
2003
IEEE
14 years 2 months ago
Intrusion Detection: A Bioinformatics Approach
This paper addresses the problem of detecting masquerading, a security attack in which an intruder assumes the identity of a legitimate user. Many approaches based on Hidden Marko...
Scott E. Coull, Joel W. Branch, Boleslaw K. Szyman...
CCS
2009
ACM
14 years 3 months ago
Learning your identity and disease from research papers: information leaks in genome wide association study
Genome-wide association studies (GWAS) aim at discovering the association between genetic variations, particularly single-nucleotide polymorphism (SNP), and common diseases, which...
Rui Wang, Yong Fuga Li, XiaoFeng Wang, Haixu Tang,...
BMCBI
2010
218views more  BMCBI 2010»
13 years 6 months ago
A hybrid blob-slice model for accurate and efficient detection of fluorescence labeled nuclei in 3D
Background: To exploit the flood of data from advances in high throughput imaging of optically sectioned nuclei, image analysis methods need to correctly detect thousands of nucle...
Anthony Santella, Zhuo Du, Sonja Nowotschin, Anna-...
CMPB
2010
109views more  CMPB 2010»
13 years 9 months ago
Cell Accelerated Cryoablation Simulation
Abstract. Tracking growth of lethal ice is critical to success of percutaneous ablations using supercooled probes introduced into cancerous lesions. Physicians lack planning tools ...
Daniel J. Blezek, David G. Carlson, Lionel T. Chen...
BMCBI
2008
202views more  BMCBI 2008»
13 years 9 months ago
Network motif-based identification of transcription factor-target gene relationships by integrating multi-source biological data
Background: Integrating data from multiple global assays and curated databases is essential to understand the spatiotemporal interactions within cells. Different experiments measu...
Yuji Zhang, Jianhua Xuan, Benildo de los Reyes, Ro...