Sciweavers

2309 search results - page 346 / 462
» Using Meta-Structures in Database Design
Sort
View
BMCBI
2005
163views more  BMCBI 2005»
15 years 4 months ago
Alkahest NuclearBLAST: a user-friendly BLAST management and analysis system
Background -: Sequencing of EST and BAC end datasets is no longer limited to large research groups. Drops in per-base pricing have made high throughput sequencing accessible to in...
Stephen E. Diener, Thomas D. Houfek, Sam E. Kalat,...
120
Voted
JOC
2007
93views more  JOC 2007»
15 years 4 months ago
Robust Information-Theoretic Private Information Retrieval
A Private Information Retrieval (PIR) protocol allows a user to retrieve a data item of its choice from a database, such that the servers storing the database do not gain informat...
Amos Beimel, Yoav Stahl
TDP
2010
166views more  TDP 2010»
14 years 11 months ago
Communication-Efficient Privacy-Preserving Clustering
The ability to store vast quantities of data and the emergence of high speed networking have led to intense interest in distributed data mining. However, privacy concerns, as well ...
Geetha Jagannathan, Krishnan Pillaipakkamnatt, Reb...
160
Voted
NAR
2011
248views Computer Vision» more  NAR 2011»
14 years 7 months ago
NCBI GEO: archive for functional genomics data sets - 10 years on
A decade ago, the Gene Expression Omnibus (GEO) database was established at the National Center for Biotechnology Information (NCBI). The original objective of GEO was to serve as...
Tanya Barrett, Dennis B. Troup, Stephen E. Wilhite...
178
Voted
IDEAS
2008
IEEE
256views Database» more  IDEAS 2008»
15 years 11 months ago
WIDS: a sensor-based online mining wireless intrusion detection system
This paper proposes WIDS, a wireless intrusion detection system, which applies data mining clustering technique to wireless network data captured through hardware sensors for purp...
Christie I. Ezeife, Maxwell Ejelike, Akshai K. Agg...