Sciweavers

4924 search results - page 961 / 985
» A Software System for Spatial Data Analysis and Modeling
Sort
View
LREC
2008
139views Education» more  LREC 2008»
13 years 10 months ago
Identification of Comparable Argument-Head Relations in Parallel Corpora
We present the machine learning framework that we are developing, in order to support explorative search for non-trivial linguistic configurations in low-density languages (langua...
Kathrin Spreyer, Jonas Kuhn, Bettina Schrader
BMCBI
2010
118views more  BMCBI 2010»
13 years 8 months ago
svdPPCS: an effective singular value decomposition-based method for conserved and divergent co-expression gene module identifica
Background: Comparative analysis of gene expression profiling of multiple biological categories, such as different species of organisms or different kinds of tissue, promises to e...
Wensheng Zhang, Andrea Edwards, Wei Fan, Dongxiao ...
TRIDENTCOM
2006
IEEE
14 years 2 months ago
Emulation versus simulation: A case study of TCP-targeted denial of service attacks
—In this paper, we investigate the applicability of simulation and emulation for denial of service (DoS) attack experimentation. As a case study, we consider low-rate TCP-targete...
Roman Chertov, Sonia Fahmy, Ness B. Shroff
CCS
2010
ACM
13 years 5 months ago
Practical leakage-resilient pseudorandom generators
Cryptographic systems and protocols are the core of many Internet security procedures (such as SSL, SSH, IPSEC, DNSSEC, secure mail, etc.). At the heart of all cryptographic funct...
Yu Yu, François-Xavier Standaert, Olivier P...
TAICPART
2006
IEEE
144views Education» more  TAICPART 2006»
14 years 2 months ago
Testing the Implementation of Business Rules Using Intensional Database Tests
One of the key roles of any information system is to enforce the business rules and policies set by the owning organisation. As for any important functionality, it is necessary to...
David Willmor, Suzanne M. Embury