Sciweavers

1997 search results - page 373 / 400
» A Model for Data Leakage Detection
Sort
View
CONCUR
2005
Springer
14 years 4 months ago
Concurrent Clustered Programming
d Abstract) Vijay Saraswat1 and Radha Jagadeesan2 1 IBM T.J. Watson Research Lab 2 School of CTI, DePaul University Abstract. We present the concurrency and distribution primitives...
Vijay A. Saraswat, Radha Jagadeesan
SIGMOD
2010
ACM
267views Database» more  SIGMOD 2010»
14 years 3 months ago
Processing proximity relations in road networks
Applications ranging from location-based services to multi-player online gaming require continuous query support to monitor, track, and detect events of interest among sets of mov...
Zhengdao Xu, Hans-Arno Jacobsen
BIOCOMP
2006
14 years 11 days ago
Surgeon's Magic Wand: A Screen Pointing Interactive Method
: A novel, non-touch, screen pointing "magic wand" interface is proposed for surgeon's use in an environment requiring simultaneous display of several patients'...
Naren Vira, Shaleen Vira
BIOINFORMATICS
2010
116views more  BIOINFORMATICS 2010»
13 years 11 months ago
A principal skeleton algorithm for standardizing confocal images of fruit fly nervous systems
Motivation: The fruit fly (Drosophila melanogaster) is a commonly used model organism in biology. We are currently building a 3D digital atlas of the fruit fly larval nervous syst...
Lei Qu, Hanchuan Peng
BMCBI
2010
113views more  BMCBI 2010»
13 years 11 months ago
Statistical method on nonrandom clustering with application to somatic mutations in cancer
Background: Human cancer is caused by the accumulation of tumor-specific mutations in oncogenes and tumor suppressors that confer a selective growth advantage to cells. As a conse...
Jingjing Ye, Adam Pavlícek, Elizabeth A. Lu...