Sciweavers

157 search results - page 24 / 32
» CoCoNUT: an efficient system for the comparison and analysis...
Sort
View
BMCBI
2004
133views more  BMCBI 2004»
13 years 7 months ago
Esub8: A novel tool to predict protein subcellular localizations in eukaryotic organisms
Background: Subcellular localization of a new protein sequence is very important and fruitful for understanding its function. As the number of new genomes has dramatically increas...
Qinghua Cui, Tianzi Jiang, Bing Liu, Songde Ma
SIGMOD
2006
ACM
232views Database» more  SIGMOD 2006»
14 years 7 months ago
High-performance complex event processing over streams
In this paper, we present the design, implementation, and evaluation of a system that executes complex event queries over real-time streams of RFID readings encoded as events. The...
Eugene Wu 0002, Yanlei Diao, Shariq Rizvi
IESS
2007
Springer
165views Hardware» more  IESS 2007»
14 years 1 months ago
Data Reuse Driven Memory and Network-On-Chip Co-Synthesis
NoCs present a possible communication infrastructure solution to deal with increased design complexity and shrinking time-to-market. The communication infrastructure is a signific...
Ilya Issenin, Nikil Dutt
SDM
2004
SIAM
211views Data Mining» more  SDM 2004»
13 years 8 months ago
Using Support Vector Machines for Classifying Large Sets of Multi-Represented Objects
Databases are a key technology for molecular biology which is a very data intensive discipline. Since molecular biological databases are rather heterogeneous, unification and data...
Hans-Peter Kriegel, Peer Kröger, Alexey Pryak...
ACSAC
2004
IEEE
13 years 11 months ago
Visualizing and Identifying Intrusion Context from System Calls Trace
Anomaly-based Intrusion Detection (AID) techniques are useful for detecting novel intrusions without known signatures. However, AID techniques suffer from higher false alarm rate ...
Zhuowei Li, Amitabha Das