Sciweavers

844 search results - page 129 / 169
» Experiences Applying Agile Practices to Large Systems
Sort
View
ACSAC
2008
IEEE
14 years 2 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...
CVPR
2007
IEEE
14 years 9 months ago
Spatial selection for attentional visual tracking
Long-duration tracking of general targets is quite challenging for computer vision, because in practice target may undergo large uncertainties in its visual appearance and the unc...
Ming Yang, Junsong Yuan, Ying Wu
BMCBI
2010
144views more  BMCBI 2010»
13 years 7 months ago
Identifying overrepresented concepts in gene lists from literature: a statistical approach based on Poisson mixture model
Background: Large-scale genomic studies often identify large gene lists, for example, the genes sharing the same expression patterns. The interpretation of these gene lists is gen...
Xin He, Moushumi Sen Sarma, Xu Ling, Brant W. Chee...
ISSTA
2004
ACM
14 years 1 months ago
An optimizing compiler for batches of temporal logic formulas
Model checking based on validating temporal logic formulas has proven practical and effective for numerous software engineering applications. As systems based on this approach ha...
James Ezick
BIRTHDAY
2010
Springer
14 years 24 days ago
Indexing and Searching a Mass Spectrometry Database
Abstract. Database preprocessing in order to create an index often permits considerable speedup in search compared to the iterated query of an unprocessed database. In this paper w...
Søren Besenbacher, Benno Schwikowski, Jens ...