Sciweavers

350 search results - page 55 / 70
» From control effects to typed continuation passing
Sort
View
BMCBI
2010
118views more  BMCBI 2010»
13 years 7 months ago
Towards realistic benchmarks for multiple alignments of non-coding sequences
Background: With the continued development of new computational tools for multiple sequence alignment, it is necessary today to develop benchmarks that aid the selection of the mo...
Jaebum Kim, Saurabh Sinha
SIGIR
2012
ACM
11 years 10 months ago
Fighting against web spam: a novel propagation method based on click-through data
Combating Web spam is one of the greatest challenges for Web search engines. State-of-the-art anti-spam techniques focus mainly on detecting varieties of spam strategies, such as ...
Chao Wei, Yiqun Liu, Min Zhang, Shaoping Ma, Liyun...
ISCA
2006
IEEE
133views Hardware» more  ISCA 2006»
14 years 1 months ago
TRAP-Array: A Disk Array Architecture Providing Timely Recovery to Any Point-in-time
RAID architectures have been used for more than two decades to recover data upon disk failures. Disk failure is just one of the many causes of damaged data. Data can be damaged by...
Qing Yang, Weijun Xiao, Jin Ren
VRML
2004
ACM
14 years 27 days ago
PathSim visualizer: an Information-Rich Virtual Environment framework for systems biology
Increasingly, biology researchers and medical practitioners are using computational tools to model and analyze dynamic systems across scales from the macro to the cellular to the ...
Nicholas F. Polys, Doug A. Bowman, Chris North, Re...
IACR
2011
86views more  IACR 2011»
12 years 7 months ago
Protecting Drive Encryption Systems Against Memory Attacks
Software drive encryption systems are vulnerable to memory attacks, in which an attacker gains physical accesses to the unattended computer, obtains the decryption keys from memor...
Leo Dorrendorf