Sciweavers

140 search results - page 25 / 28
» An Interval Intelligent-based Approach for Fault Detection a...
Sort
View
SWWS
2010
13 years 6 months ago
Improving User Query Processing Based on User Profile and Task Context
- Today there is a real challenge in accessing relevant information according to the needs and the context of the user. Recent studies have dynamically enhanced the user query with...
Ounas Asfari, Bich-Liên Doan, Yolaine Bourda...
BMCBI
2010
122views more  BMCBI 2010»
13 years 9 months ago
Ovarian cancer classification based on dimensionality reduction for SELDI-TOF data
Background: Recent advances in proteomics technologies such as SELDI-TOF mass spectrometry has shown promise in the detection of early stage cancers. However, dimensionality reduc...
Kai-Lin Tang, Tong-Hua Li, Wen-Wei Xiong, Kai Chen
ICSE
2008
IEEE-ACM
14 years 9 months ago
Automatic modularity conformance checking
According to Parnas's information hiding principle and Baldwin and Clark's design rule theory, the key step to decomposing a system into modules is to determine the desi...
Sunny Huynh, Yuanfang Cai, Yuanyuan Song, Kevin J....
ENTCS
2008
132views more  ENTCS 2008»
13 years 8 months ago
Distributed Verification of Multi-threaded C++ Programs
Verification of multi-threaded C++ programs poses three major challenges: the large number of states, states with huge sizes, and time intensive expansions of states. This paper p...
Stefan Edelkamp, Shahid Jabbar, Damian Sulewski
SIGSOFT
2007
ACM
14 years 9 months ago
SLEDE: lightweight verification of sensor network security protocol implementations
Finding flaws in security protocol implementations is hard. Finding flaws in the implementations of sensor network security protocols is even harder because they are designed to p...
Youssef Hanna