Sciweavers

130 search results - page 9 / 26
» A Formal Way from Text to Code Templates
Sort
View
135
Voted
ENTCS
2008
137views more  ENTCS 2008»
15 years 3 months ago
Computerizing Mathematical Text with MathLang
Mathematical texts can be computerized in many ways that capture differing amounts of the mathematical meaning. At one end, there is document imaging, which captures the arrangeme...
Fairouz Kamareddine, J. B. Wells
158
Voted
ICWSM
2009
15 years 1 months ago
From Generating to Mining: Automatically Scripting Conversations Using Existing Online Sources
Hearing people argue opposing sides of an issue can be a useful way to understand the topic; however, these debates or conversations often don't exist. Unfortunately, generat...
Nathan D. Nichols, Lisa M. Gandy, Kristian J. Hamm...
145
Voted
BMCBI
2007
156views more  BMCBI 2007»
15 years 3 months ago
Bio: : NEXUS: a Perl API for the NEXUS format for comparative biological data
Background: Evolutionary analysis provides a formal framework for comparative analysis of genomic and other data. In evolutionary analysis, observed data are treated as the termin...
Thomas Hladish, Vivek Gopalan, Chengzhi Liang, Wei...
131
Voted
AVBPA
2005
Springer
275views Biometrics» more  AVBPA 2005»
15 years 9 months ago
Vulnerabilities in Biometric Encryption Systems
Abstract. The goal of a biometric encryption system is to embed a secret into a biometric template in a way that can only be decrypted with a biometric image from the enroled perso...
Andy Adler
93
Voted
COMPSAC
2005
IEEE
15 years 9 months ago
Buffer Overrun Prevention Through Component Composition Analysis
Buffer overrun vulnerabilities cause significant security problems, and have proven to be difficult to prevent. In this paper we present a novel approach to tackling the problem...
David Llewellyn-Jones, Madjid Merabti, Qi Shi, Bob...