Sciweavers

280 search results - page 16 / 56
» Vulnerability Discovery Modeling Using Weibull Distribution
Sort
View
HAIS
2009
Springer
14 years 8 days ago
An Evolutionary Ensemble-Based Method for Rule Extraction with Distributed Data
This paper presents a methodology for knowledge discovery from inherently distributed data without moving it from its original location, completely or partially, to other locations...
Diego M. Escalante, Miguel Angel Rodriguez, Antoni...
BMCBI
2007
101views more  BMCBI 2007»
13 years 7 months ago
Relationship between insertion/deletion (indel) frequency of proteins and essentiality
Background: In a previous study, we demonstrated that some essential proteins from pathogenic organisms contained sizable insertions/deletions (indels) when aligned to human prote...
Simon K. Chan, Michael Hsing, Fereydoun Hormozdiar...
KDD
1998
ACM
145views Data Mining» more  KDD 1998»
13 years 12 months ago
Aggregation of Imprecise and Uncertain Information for Knowledge Discovery in Databases
We consider the problem of aggregation for uncertain and imprecise data. For such data, we define aggregation operators and use them to provide information on properties and patte...
Sally I. McClean, Bryan W. Scotney, Mary Shapcott
COMCOM
2011
13 years 2 months ago
Modeling gossip-based content dissemination and search in distributed networking
This paper presents a rigorous analytic study of gossip-based message dissemination schemes that can be employed for content/service dissemination or discovery in unstructured and...
Siyu Tang, Eva Jaho, Ioannis Stavrakakis, Ioannis ...
CBMS
2008
IEEE
14 years 2 months ago
Behavior-Based Access Control for Distributed Healthcare Environment
Privacy and security are critical requirements for using patient profiles in distributed healthcare environments. The amalgamation of new information technology with traditional ...
Mohammad H. Yarmand, Kamran Sartipi, Douglas G. Do...