Sciweavers

315 search results - page 60 / 63
» Interactive data summarization: an example application
Sort
View
JCST
2010
119views more  JCST 2010»
13 years 5 months ago
Location, Localization, and Localizability
Abstract Location-aware technology spawns numerous unforeseen pervasive applications in a wide range of living, production, commence, and public services. This article provides an ...
Yunhao Liu, Zheng Yang, Xiaoping Wang, Lirong Jian
CF
2010
ACM
14 years 16 days ago
Variant-based competitive parallel execution of sequential programs
Competitive parallel execution (CPE) is a simple yet attractive technique to improve the performance of sequential programs on multi-core and multi-processor systems. A sequential...
Oliver Trachsel, Thomas R. Gross
CSFW
2002
IEEE
14 years 12 days ago
Types and Effects for Asymmetric Cryptographic Protocols
We present the first type and effect system for proving authenticity properties of security protocols based on asymmetric cryptography. The most significant new features of our ...
Andrew D. Gordon, Alan Jeffrey
BMCBI
2010
175views more  BMCBI 2010»
13 years 7 months ago
The BridgeDb framework: standardized access to gene, protein and metabolite identifier mapping services
Background: Many complementary solutions are available for the identifier mapping problem. This creates an opportunity for bioinformatics tool developers. Tools can be made to fle...
Martijn P. van Iersel, Alexander R. Pico, Thomas K...
EDBT
2006
ACM
122views Database» more  EDBT 2006»
14 years 7 months ago
TQuEST: Threshold Query Execution for Large Sets of Time Series
Effective and efficient data mining in time series databases is essential in many application domains as for instance in financial analysis, medicine, meteorology, and environmenta...
Johannes Aßfalg, Hans-Peter Kriegel, Peer Kr...