Sciweavers

945 search results - page 180 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
CCS
2007
ACM
14 years 2 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
BMCBI
2010
95views more  BMCBI 2010»
13 years 8 months ago
Quantifying the relationship between sequence and three-dimensional structure conservation in RNA
Background: In recent years, the number of available RNA structures has rapidly grown reflecting the increased interest on RNA biology. Similarly to the studies carried out two de...
Emidio Capriotti, Marc A. Martí-Renom
LBM
2007
13 years 10 months ago
Syntactic Features for Protein-Protein Interaction Extraction
Background: Extracting Protein-Protein Interactions (PPI) from research papers is a way of translating information from English to the language used by the databases that store th...
Rune Sætre, Kenji Sagae, Jun-ichi Tsujii
MM
2006
ACM
199views Multimedia» more  MM 2006»
14 years 2 months ago
Concept-based electronic health records: opportunities and challenges
Healthcare is a data-rich but information-poor domain. Terabytes of multimedia medical data are being generated on a monthly basis in a typical healthcare organization in order to...
Shahram Ebadollahi, Anni Coden, Michael A. Tanenbl...
CIKM
2008
Springer
13 years 10 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher