Sciweavers

766 search results - page 105 / 154
» Detecting modifications in paper documents: a coding approac...
Sort
View
BIBE
2006
IEEE
184views Bioinformatics» more  BIBE 2006»
14 years 3 months ago
A Language Modeling Text Mining Approach to the Annotation of Protein Community
This paper discusses an ontology based language modeling text mining approach to the annotation of protein community. Communities appear to play an important role in the functional...
Xiaodan Zhang, Daniel Duanqing Wu, Xiaohua Zhou, X...
CIKM
2008
Springer
13 years 11 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher
TIP
2008
128views more  TIP 2008»
13 years 9 months ago
The Pairing of a Wavelet Basis With a Mildly Redundant Analysis via Subband Regression
A distinction is usually made between wavelet bases and wavelet frames. The former are associated with a one-to-one representation of signals, which is somewhat constrained but mos...
Michael Unser, Dimitri Van De Ville
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 3 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
ICSE
2008
IEEE-ACM
14 years 9 months ago
Clone detection in automotive model-based development
Model-based development is becoming an increasingly common development methodology. In important domains like embedded systems already major parts of the code are generated from m...
Benjamin Hummel, Bernhard Schätz, Elmar J&uum...