Sciweavers

123 search results - page 7 / 25
» A Comparative Study of Various Nested Normal Forms
Sort
View
ACSAC
2001
IEEE
13 years 11 months ago
Temporal Signatures for Intrusion Detection
We introduce a new method for detecting intrusions based on the temporal behavior of applications. It builds on an existing method of application intrusion detection developed at ...
Anita Jones, Song Li
CORR
2010
Springer
165views Education» more  CORR 2010»
13 years 7 months ago
Cut-Elimination and Proof Search for Bi-Intuitionistic Tense Logic
We consider an extension of bi-intuitionistic logic with the traditional modalities , , and from tense logic Kt. Proof theoretically, this extension is obtained simply by extendin...
Rajeev Goré, Linda Postniece, Alwen Tiu
VLDB
2005
ACM
165views Database» more  VLDB 2005»
14 years 28 days ago
Semantic Adaptation of Schema Mappings when Schemas Evolve
Schemas evolve over time to accommodate the changes in the information they represent. Such evolution causes invalidation of various artifacts depending on the schemas, such as sc...
Cong Yu, Lucian Popa
BMCBI
2006
171views more  BMCBI 2006»
13 years 7 months ago
The effect of oligonucleotide microarray data pre-processing on the analysis of patient-cohort studies
Background: Intensity values measured by Affymetrix microarrays have to be both normalized, to be able to compare different microarrays by removing non-biological variation, and s...
Roel G. W. Verhaak, Frank J. T. Staal, Peter J. M....
IEEEPACT
2006
IEEE
14 years 1 months ago
An empirical evaluation of chains of recurrences for array dependence testing
Code restructuring compilers rely heavily on program analysis techniques to automatically detect data dependences between program statements. Dependences between statement instanc...
Johnnie Birch, Robert A. van Engelen, Kyle A. Gall...