User profiles for Eleazar Eskin
Eleazar EskinUniversity of California, Los Angeles Verified email at cs.ucla.edu Cited by 49254 |
Variance component model to account for sample structure in genome-wide association studies
Although genome-wide association studies (GWASs) have identified numerous loci associated
with complex traits, imprecise modeling of the genetic relatedness within study samples …
with complex traits, imprecise modeling of the genetic relatedness within study samples …
Efficient control of population structure in model organism association mapping
Genomewide association mapping in model organisms such as inbred mouse strains is a
promising approach for the identification of risk factors related to human diseases. However, …
promising approach for the identification of risk factors related to human diseases. However, …
Assessing computational tools for the discovery of transcription factor binding sites
The prediction of regulatory elements is a problem where computational methods offer great
hope. Over the past few years, numerous tools have become available for this task. The …
hope. Over the past few years, numerous tools have become available for this task. The …
Real time data mining-based intrusion detection
We present an overview of our research in real time data mining-based intrusion detection
systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real …
systems (IDSs). We focus on issues related to deploying a data mining-based IDS in a real …
[PDF][PDF] Finding composite regulatory patterns in DNA sequences
E Eskin, PA Pevzner - BIOINFORMATICS-OXFORD-, 2002 - Citeseer
Pattern discovery in unaligned DNA sequences is a fundamental problem in computational
biology with important applications in finding regulatory signals. Current approaches to …
biology with important applications in finding regulatory signals. Current approaches to …
Data mining methods for detection of new malicious executables
A serious security threat today is malicious executables, especially new, unseen malicious
executables often arriving as email attachments. These new malicious executables are …
executables often arriving as email attachments. These new malicious executables are …
[HTML][HTML] Mouse genomic variation and its effect on phenotypes and gene regulation
…, A Agam, G Slater, M Goodson, NA Furlotte, E Eskin… - Nature, 2011 - nature.com
We report genome sequences of 17 inbred strains of laboratory mice and identify almost ten
times more variants than previously known. We use these genomes to explore the …
times more variants than previously known. We use these genomes to explore the …
A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data
Most current intrusion detection systems employ signature-based methods or data mining-based
methods which rely on labeled training data. This training data is typically expensive to …
methods which rely on labeled training data. This training data is typically expensive to …
The spectrum kernel: A string kernel for SVM protein classification
We introduce a new sequence-similarity kernel, the spectrum kernel, for use with support
vector machines (SVMs) in a discriminative approach to the protein classification problem. Our …
vector machines (SVMs) in a discriminative approach to the protein classification problem. Our …
Whole-genome patterns of common DNA variation in three human populations
Individual differences in DNA sequence are the genetic basis of human variability. We have
characterized whole-genome patterns of common human DNA variation by genotyping …
characterized whole-genome patterns of common human DNA variation by genotyping …