Sciweavers

768 search results - page 57 / 154
» Comparing User and Software Information Structures for Compa...
Sort
View
BMCBI
2006
116views more  BMCBI 2006»
15 years 2 months ago
Whole genome association mapping by incompatibilities and local perfect phylogenies
Background: With current technology, vast amounts of data can be cheaply and efficiently produced in association studies, and to prevent data analysis to become the bottleneck of ...
Thomas Mailund, Søren Besenbacher, Mikkel H...
ENVSOFT
2006
84views more  ENVSOFT 2006»
15 years 2 months ago
Modeling the fate of down-the-drain chemicals in rivers: An improved software for GREAT-ER
GREAT-ER (Geography-referenced Regional Exposure Assessment Tool for European Rivers) is a model system for predicting chemical fate and exposure in surface waters. The GREAT-ER a...
F. Koormann, J. Rominger, D. Schowanek, J.-O. Wagn...
SIGMOD
2012
ACM
190views Database» more  SIGMOD 2012»
13 years 5 months ago
Sample-driven schema mapping
End-users increasingly find the need to perform light-weight, customized schema mapping. State-of-the-art tools provide powerful functions to generate schema mappings, but they u...
Li Qian, Michael J. Cafarella, H. V. Jagadish
ICSM
2003
IEEE
15 years 7 months ago
DART: A Framework for Regression Testing "Nightly/daily Builds" of GUI Applications
“Nightly/daily building and smoke testing” have become widespread since they often reveal bugs early in the software development process. During these builds, software is comp...
Atif M. Memon, Ishan Banerjee, Nada Hashmi, Adithy...
146
Voted
ASWEC
2006
IEEE
15 years 8 months ago
Preventing SQL Injection Attacks in Stored Procedures
An SQL injection attack targets interactive web applications that employ database services. These applications accept user inputs and use them to form SQL statements at runtime. D...
Ke Wei, Muthusrinivasan Muthuprasanna, Suraj Kotha...