Sciweavers

1342 search results - page 254 / 269
» Managing Collaboration in the nanoManipulator
Sort
View
KDD
2003
ACM
161views Data Mining» more  KDD 2003»
14 years 8 months ago
Empirical Bayesian data mining for discovering patterns in post-marketing drug safety
Because of practical limits in characterizing the safety profiles of therapeutic products prior to marketing, manufacturers and regulatory agencies perform post-marketing surveill...
David M. Fram, June S. Almenoff, William DuMouchel
SIGMOD
2001
ACM
134views Database» more  SIGMOD 2001»
14 years 8 months ago
Preservation of Digital Data with Self-Validating, Self-Instantiating Knowledge-Based Archives
Digital archives are dedicated to the long-term preservation of electronic information and have the mandate to enable sustained access despite rapid technology changes. Persistent...
Bertram Ludäscher, Richard Marciano, Reagan Moore
ICSE
2008
IEEE-ACM
14 years 8 months ago
Continuous coordination within the context of cooperative and human aspects of software engineering
We have developed software tools that aim to support the cooperative software engineering tasks and promote an awareness of social dependencies that is essential to successful coo...
André van der Hoek, Anita Sarma, Ban Al-Ani...
MOBISYS
2006
ACM
14 years 7 months ago
FireWxNet: a multi-tiered portable wireless system for monitoring weather conditions in wildland fire environments
In this paper we present FireWxNet, a multi-tiered portable wireless system for monitoring weather conditions in rugged wildland fire environments. FireWxNet provides the fire fig...
Carl Hartung, Richard Han, Carl Seielstad, Saxon H...
SOSP
2003
ACM
14 years 4 months ago
Model-carrying code: a practical approach for safe execution of untrusted applications
This paper presents a new approach called model-carrying code (MCC) for safe execution of untrusted code. At the heart of MCC is the idea that untrusted code comes equipped with a...
R. Sekar, V. N. Venkatakrishnan, Samik Basu, Sande...