Sciweavers

301 search results - page 24 / 61
» An efficient algorithm to verify generalized false paths
Sort
View
EDBT
2004
ACM
126views Database» more  EDBT 2004»
14 years 8 months ago
Spatial Queries in the Presence of Obstacles
Despite the existence of obstacles in many database applications, traditional spatial query processing utilizes the Euclidean distance metric assuming that points in space are dire...
Jun Zhang, Dimitris Papadias, Kyriakos Mouratidis,...
TDSC
2010
172views more  TDSC 2010»
13 years 3 months ago
Proactive Detection of Computer Worms Using Model Checking
Although recent estimates are speaking of 200,000 different viruses, worms, and Trojan horses, the majority of them are variants of previously existing malware. As these variants m...
Johannes Kinder, Stefan Katzenbeisser, Christian S...
BMCBI
2011
13 years 2 days ago
Reconstructing genome-wide regulatory network of E. coli using transcriptome data and predicted transcription factor activities
Background: Gene regulatory networks play essential roles in living organisms to control growth, keep internal metabolism running and respond to external environmental changes. Un...
Yao Fu, Laura R. Jarboe, Julie A. Dickerson
KDD
2008
ACM
115views Data Mining» more  KDD 2008»
14 years 9 months ago
SPIRAL: efficient and exact model identification for hidden Markov models
Hidden Markov models (HMMs) have received considerable attention in various communities (e.g, speech recognition, neurology and bioinformatic) since many applications that use HMM...
Yasuhiro Fujiwara, Yasushi Sakurai, Masashi Yamamu...
DATESO
2010
96views Database» more  DATESO 2010»
13 years 6 months ago
A Framework for Efficient Design, Maintaining, and Evolution of a System of XML Applications
Abstract. The today's applications usually form a system of sub-applications, each being responsible for a particular functionality. Hence, the design and maintenance of such ...
Martin Necaský, Irena Mlýnková...