Sciweavers

325 search results - page 38 / 65
» A Model of Methods Access Authorization in Object-oriented D...
Sort
View
CSB
2004
IEEE
115views Bioinformatics» more  CSB 2004»
13 years 11 months ago
PoPS: A Computational Tool for Modeling and Predicting Protease Specificity
Proteases play a fundamental role in the control of intra- and extracellular processes by binding and cleaving specific amino acid sequences. Identifying these targets is extremel...
Sarah E. Boyd, Maria J. García de la Banda,...
SIGMOD
2010
ACM
232views Database» more  SIGMOD 2010»
13 years 7 months ago
Optimizing content freshness of relations extracted from the web using keyword search
An increasing number of applications operate on data obtained from the Web. These applications typically maintain local copies of the web data to avoid network latency in data acc...
Mohan Yang, Haixun Wang, Lipyeow Lim, Min Wang
WEBDB
2010
Springer
155views Database» more  WEBDB 2010»
14 years 22 days ago
Learning Topical Transition Probabilities in Click Through Data with Regression Models
The transition of search engine usersā€™ intents has been studied for a long time. The knowledge of intent transition, once discovered, can yield a better understanding of how diļ...
Xiao Zhang, Prasenjit Mitra
DASFAA
2008
IEEE
116views Database» more  DASFAA 2008»
13 years 9 months ago
MBR Models for Uncertainty Regions of Moving Objects
The increase in the advanced location based services such as traffic coordination and management necessitates the need for advanced models tracking the positions of Moving Objects ...
Shayma Alkobaisi, Wan D. Bae, Seon Ho Kim, Byunggu...
IDEAL
2010
Springer
13 years 5 months ago
Trajectory Based Behavior Analysis for User Verification
Many of our activities on computer need a verification step for authorized access. The goal of verification is to tell apart the true account owner from intruders. We propose a gen...
Hsing-Kuo Pao, Hong-Yi Lin, Kuan-Ta Chen, Junaidil...