Sciweavers

252 search results - page 30 / 51
» The Protection Of Public Health Data - A Case Study
Sort
View
CSDA
2010
172views more  CSDA 2010»
13 years 7 months ago
Testing for two components in a switching regression model
We consider switching regression models with independent or Markov-dependent regime. Based on the modified likelihood ratio test (LRT) statistic by Chen, Chen and Kalbfleisch (200...
Jörn Dannemann, Hajo Holzmann
WPES
2005
ACM
14 years 1 months ago
Maintaining privacy on derived objects
Protecting privacy means to ensure users that access to their personal data complies with their preferences. However, information can be manipulated in order to derive new objects...
Nicola Zannone, Sushil Jajodia, Fabio Massacci, Du...
BMCBI
2006
200views more  BMCBI 2006»
13 years 7 months ago
Comparison and evaluation of methods for generating differentially expressed gene lists from microarray data
Background: Numerous feature selection methods have been applied to the identification of differentially expressed genes in microarray data. These include simple fold change, clas...
Ian B. Jeffery, Desmond G. Higgins, Aedín C...
ISBI
2006
IEEE
14 years 8 months ago
A flexible framework for Web interfaces to image databases: supporting user-defined ontologies and links to external databases
Vocabularies to describe research findings are needed to effectively use scientific databases. As understanding of data evolves, scientists need tools for extending the vocabulari...
Josiah Johnston, Arpun Nagaraja, Harry Hochheiser,...
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 8 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...