Sciweavers

64 search results - page 5 / 13
» An Extensible Framework for Database Security Assessment and...
Sort
View
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
13 years 6 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
HVEI
2010
13 years 5 months ago
No-reference image quality assessment based on localized gradient statistics: application to JPEG and JPEG2000
This paper presents a novel system that employs an adaptive neural network for the no-reference assessment of perceived quality of JPEG/JPEG2000 coded images. The adaptive neural ...
Hantao Liu, Judith Redi, Hani Alers, Rodolfo Zunin...
IMC
2004
ACM
14 years 1 months ago
A framework for malicious workload generation
Malicious traffic from self-propagating worms and denialof-service attacks constantly threatens the everyday operation of Internet systems. Defending networks from these threats d...
Joel Sommers, Vinod Yegneswaran, Paul Barford
ESE
2006
154views Database» more  ESE 2006»
13 years 7 months ago
Prioritizing JUnit Test Cases: An Empirical Assessment and Cost-Benefits Analysis
Test case prioritization provides a way to run test cases with the highest priority earliest. Numerous empirical studies have shown that prioritization can improve a test suite�...
Hyunsook Do, Gregg Rothermel, Alex Kinneer
BMCBI
2008
129views more  BMCBI 2008»
13 years 7 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...