Sciweavers

418 search results - page 83 / 84
» Deriving Systems Level Security Properties of Component Base...
Sort
View
VMCAI
2004
Springer
14 years 24 days ago
Construction of a Semantic Model for a Typed Assembly Language
Typed Assembly Languages (TALs) can be used to validate the safety of assembly-language programs. However, typing rules are usually trusted as axioms. In this paper, we show how to...
Gang Tan, Andrew W. Appel, Kedar N. Swadi, Dinghao...
SIGMOD
2011
ACM
270views Database» more  SIGMOD 2011»
12 years 10 months ago
Automatic discovery of attributes in relational databases
In this work we design algorithms for clustering relational columns into attributes, i.e., for identifying strong relationships between columns based on the common properties and ...
Meihui Zhang, Marios Hadjieleftheriou, Beng Chin O...
TIP
2010
170views more  TIP 2010»
13 years 2 months ago
Tracking and Activity Recognition Through Consensus in Distributed Camera Networks
Camera networks are being deployed for various applications like security and surveillance, disaster response and environmental modeling. However, there is little automated process...
Bi Song, Ahmed T. Kamal, Cristian Soto, Chong Ding...
BMCBI
2008
110views more  BMCBI 2008»
13 years 7 months ago
Enhancing the prediction of protein pairings between interacting families using orthology information
Background: It has repeatedly been shown that interacting protein families tend to have similar phylogenetic trees. These similarities can be used to predicting the mapping betwee...
José M. G. Izarzugaza, David de Juan, Carle...
CLADE
2008
IEEE
14 years 1 months ago
SWARM: a scientific workflow for supporting bayesian approaches to improve metabolic models
With the exponential growth of complete genome sequences, the analysis of these sequences is becoming a powerful approach to build genome-scale metabolic models. These models can ...
Xinghua Shi, Rick Stevens