Sciweavers

1607 search results - page 310 / 322
» The existence of k-radius sequences
Sort
View
COMCOM
2006
154views more  COMCOM 2006»
13 years 7 months ago
Minimum-cost network hardening using attack graphs
In defending one's network against cyber attack, certain vulnerabilities may seem acceptable risks when considered in isolation. But an intruder can often infiltrate a seemin...
Lingyu Wang, Steven Noel, Sushil Jajodia
DKE
2006
70views more  DKE 2006»
13 years 7 months ago
Merging news reports that describe events
Many kinds of news report provide information about events. For example, business news reports in the area of mergers and acquisitions, provide information about events such as &q...
Anthony Hunter, Rupert Summerton
DKE
2006
157views more  DKE 2006»
13 years 7 months ago
XML structural delta mining: Issues and challenges
Recently, there is an increasing research efforts in XML data mining. These research efforts largely assumed that XML documents are static. However, in reality, the documents are ...
Qiankun Zhao, Ling Chen 0002, Sourav S. Bhowmick, ...
BMCBI
2007
142views more  BMCBI 2007»
13 years 7 months ago
Support Vector Machine-based method for predicting subcellular localization of mycobacterial proteins using evolutionary informa
Background: In past number of methods have been developed for predicting subcellular location of eukaryotic, prokaryotic (Gram-negative and Gram-positive bacteria) and human prote...
Mamoon Rashid, Sudipto Saha, Gajendra P. S. Raghav...
BMCBI
2007
78views more  BMCBI 2007»
13 years 7 months ago
Improved human disease candidate gene prioritization using mouse phenotype
Background: The majority of common diseases are multi-factorial and modified by genetically and mechanistically complex polygenic interactions and environmental factors. High-thro...
Jing Chen, Huan Xu, Bruce J. Aronow, Anil G. Jegga