Sciweavers

7121 search results - page 125 / 1425
» Modeling Signs Using Functional Data Analysis
Sort
View
IWEB
1998
13 years 10 months ago
Using Java for the Coordination of Workflows in the World Wide Web
In this paper we introduce a workflow management system, called WebFlow, which is based on the world wide web and Java as its basic technologies. Java is used as the build time (m...
Michael Weber, Torsten Illmann
KES
2005
Springer
14 years 2 months ago
Bayesian Validation of Fuzzy Clustering for Analysis of Yeast Cell Cycle Data
Clustering for the analysis of the gene expression profiles has been used for identifying the functions of the genes and of unknown genes. Since the genes usually belong to multipl...
Kyung-Joong Kim, Si-Ho Yoo, Sung-Bae Cho
ICDE
2009
IEEE
135views Database» more  ICDE 2009»
14 years 10 months ago
Forward Decay: A Practical Time Decay Model for Streaming Systems
Temporal data analysis in data warehouses and data streaming systems often uses time decay to reduce the importance of older tuples, without eliminating their influence, on the res...
Graham Cormode, Vladislav Shkapenyuk, Divesh Sriva...
COMPGEOM
2003
ACM
14 years 2 months ago
Molecular shape analysis based upon the morse-smale complex and the connolly function
Docking is the process by which two or several molecules form a complex. Docking involves the geometry of the molecular surfaces, as well as chemical and energetical consideration...
Frédéric Cazals, Frédé...
ICC
2007
IEEE
141views Communications» more  ICC 2007»
14 years 3 months ago
A Hybrid Model to Detect Malicious Executables
— We present a hybrid data mining approach to detect malicious executables. In this approach we identify important features of the malicious and benign executables. These feature...
Mohammad M. Masud, Latifur Khan, Bhavani M. Thurai...