Sciweavers

1041 search results - page 172 / 209
» Biomedical Case Studies in Data Intensive Computing
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
SBBD
2004
103views Database» more  SBBD 2004»
13 years 9 months ago
Modelagem de Bibliotecas Digitais usando a Abordagem 5S: Um Estudo de Caso
An enormous amount of information is currently available through specialized services of digital libraries (DLs). However the specification and development of DLs are very complex...
David Patricio Viscarra del Pozo, Lena Veiga e Sil...
CORR
2006
Springer
124views Education» more  CORR 2006»
13 years 7 months ago
Next Generation Language Resources using GRID
This paper presents a case study concerning the challenges and requirements posed by next generation language resources, realized as an overall model of open, distributed and coll...
Federico Calzolari, Eva Sassolini, Manuela Sassi, ...
CI
2007
130views more  CI 2007»
13 years 7 months ago
Price Dynamics, Informational Efficiency, and Wealth Distribution in Continuous Double-Auction Markets
This paper studies the properties of the continuous double auction trading mechanishm using an artificial market populated by heterogeneous computational agents. In particular, we...
Javier Gil-Bazo, David Moreno, Mikel Tapia
MICS
2007
57views more  MICS 2007»
13 years 7 months ago
Pseudozero Set of Real Multivariate Polynomials
The pseudozero set of a system P of polynomials in n variables is the subset of Cn consisting of the union of the zeros of all polynomial systems Q that are near to P in a suitable...
Stef Graillat