Sciweavers

2421 search results - page 424 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
DL
1998
Springer
111views Digital Library» more  DL 1998»
14 years 2 months ago
SONIA: A Service for Organizing Networked Information Autonomously
The recent explosion of on-line information in Digital Libraries and on the World Wide Web has given rise to a number of query-based search engines and manually constructed topica...
Mehran Sahami, Salim Yusufali, Michelle Q. Wang Ba...
GECCO
2008
Springer
122views Optimization» more  GECCO 2008»
13 years 11 months ago
Evolving machine microprograms
The realization of a control unit can be done using a complex circuitry or microprogramming. The latter may be considered as an alternative method of implementation of machine ins...
Pedro A. Castillo Valdivieso, G. Fernández,...
ECIR
2011
Springer
13 years 1 months ago
Combining Global and Local Semantic Contexts for Improving Biomedical Information Retrieval
In the context of biomedical information retrieval (IR), this paper explores the relationship between the document’s global context and the query’s local context in an attempt ...
Duy Dinh, Lynda Tamine
CCS
2011
ACM
12 years 10 months ago
BitShred: feature hashing malware for scalable triage and semantic analysis
The sheer volume of new malware found each day is growing at an exponential pace. This growth has created a need for automatic malware triage techniques that determine what malwar...
Jiyong Jang, David Brumley, Shobha Venkataraman
HPDC
2006
IEEE
14 years 4 months ago
Path Grammar Guided Trace Compression and Trace Approximation
Trace-driven simulation is an important technique used in the evaluation of computer architecture innovations. However using it for studying parallel computers and applications is...
Xiaofeng Gao, Allan Snavely, Larry Carter