Sciweavers

753 search results - page 120 / 151
» Completing a (k - 1)-Assignment
Sort
View
CIKM
2008
Springer
13 years 9 months ago
A heuristic approach for checking containment of generalized tree-pattern queries
Query processing techniques for XML data have focused mainly on tree-pattern queries (TPQs). However, the need for querying XML data sources whose structure is very complex or not...
Pawel Placek, Dimitri Theodoratos, Stefanos Soulda...
BCSHCI
2007
13 years 8 months ago
An empirical investigation into dual-task trade-offs while driving and dialing
Engaging in a secondary task, such as dialing a cell phone, while driving a car has been found to have a deleterious effect on driver performance. A point often overlooked though ...
Duncan P. Brumby, Dario D. Salvucci, Andrew Howes
CORR
2010
Springer
112views Education» more  CORR 2010»
13 years 7 months ago
Colour Guided Colour Image Steganography
Information security has become a cause of concern because of the electronic eavesdropping. Capacity, robustness and invisibility are important parameters in information hiding and...
R. Amirtharajan, Sandeep Kumar Behera, Motamarri A...
BMCBI
2007
59views more  BMCBI 2007»
13 years 7 months ago
Environment specific substitution tables for thermophilic proteins
Background: Thermophilic organisms are able to live at high temperatures ranging from 50 to > 100°C. Their proteins must be sufficiently stable to function under these extreme...
K. Mizuguchi, M. Sele, Maria Vittoria Cubellis
ENTCS
2002
134views more  ENTCS 2002»
13 years 7 months ago
Implementing Compositional Analysis Using Intersection Types With Expansion Variables
A program analysis is compositional when the analysis result for a particular program fragment is obtained solely from the results for its immediate subfragments via some composit...
Assaf J. Kfoury, Geoffrey Washburn, Joe Wells