Sciweavers

2006 search results - page 299 / 402
» Heuristic Security-Testing Methods
Sort
View
IUI
2006
ACM
14 years 3 months ago
Automatically classifying emails into activities
Email-based activity management systems promise to give users better tools for managing increasing volumes of email, by organizing email according to a user’s activities. Curren...
Mark Dredze, Tessa A. Lau, Nicholas Kushmerick
BIBE
2005
IEEE
126views Bioinformatics» more  BIBE 2005»
14 years 3 months ago
Highly Scalable and Accurate Seeds for Subsequence Alignment
We propose a method for finding seeds for the local alignment of two nucleotide sequences. Our method uses randomized algorithms to find approximate seeds. We present a dynamic ...
Abhijit Pol, Tamer Kahveci
AMAST
2004
Springer
14 years 3 months ago
A Science of Software Design
concerns, abstraction (particularly hierarchical abstraction), simplicity, and restricted visibility (locality of information). The overall goal behind these principles was stated ...
Don S. Batory
CSB
2003
IEEE
121views Bioinformatics» more  CSB 2003»
14 years 2 months ago
Epitope Prediction Algorithms for Peptide based Vaccine Design
Peptide-based vaccines, in which small peptides derived from target proteins (epitopes) are used to provoke an immune reaction, have attracted considerable attention recently as a...
Liliana Florea, Bjarni V. Halldórsson, Oliv...
CONPAR
1994
14 years 1 months ago
A Framework for Resource-Constrained Rate-Optimal Software Pipelining
The rapid advances in high-performancecomputer architectureand compilationtechniques provide both challenges and opportunitiesto exploitthe rich solution space of software pipeline...
Ramaswamy Govindarajan, Erik R. Altman, Guang R. G...