Sciweavers

1659 search results - page 221 / 332
» From Functional Analysis to Iterative Methods
Sort
View
95
Voted
MSR
2006
ACM
15 years 8 months ago
Mining eclipse for cross-cutting concerns
Software may contain functionality that does not align with its architecture. Such cross-cutting concerns do not exist from the beginning but emerge over time. By analysing where ...
Silvia Breu, Thomas Zimmermann, Christian Lindig
PKDD
2001
Springer
127views Data Mining» more  PKDD 2001»
15 years 7 months ago
Sentence Filtering for Information Extraction in Genomics, a Classification Problem
In some domains, Information Extraction (IE) from texts requires syntactic and semantic parsing. This analysis is computationally expensive and IE is potentially noisy if it applie...
Claire Nedellec, Mohamed Ould Abdel Vetah, Philipp...
154
Voted
NETWORKING
2004
15 years 4 months ago
Efficient, Authenticated, and Fault-Tolerant Key Agreement for Dynamic Peer Groups
We present an efficient authenticated and fault-tolerant protocol (AFTD) for tree-based key agreement. Our approach is driven by the insight that when a Diffie-Hellman blinded key ...
Li Zhou, Chinya V. Ravishankar
BMCBI
2006
119views more  BMCBI 2006»
15 years 2 months ago
Hidden Markov Model Variants and their Application
Markov statistical methods may make it possible to develop an unsupervised learning process that can automatically identify genomic structure in prokaryotes in a comprehensive way...
Stephen Winters-Hilt
SEFM
2006
IEEE
15 years 8 months ago
Automatic Property Checking for Software: Past, Present and Future
tic analysis tools based on abstraction are sound but not complete. Several practical static analysis tools are heuristic in nature —they are neither sound nor complete, but have...
Sriram K. Rajamani