Sciweavers

495 search results - page 53 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
COMPSAC
2008
IEEE
14 years 4 months ago
Service-Oriented Modelling of Automotive Systems
We discuss the suitability of service-oriented computing for the automotive domain. We present a formal high-level language in which complex automotive activities can be modelled ...
Laura Bocchi, José Luiz Fiadeiro, Ant&oacut...
BMCBI
2007
107views more  BMCBI 2007»
13 years 9 months ago
Prediction of potential drug targets based on simple sequence properties
Background: During the past decades, research and development in drug discovery have attracted much attention and efforts. However, only 324 drug targets are known for clinical dr...
Qingliang Li, Luhua Lai
CIBCB
2008
IEEE
14 years 4 months ago
Discovering novel cancer therapies: A computational modeling and search approach
— Solid tumors must recruit new blood vessels for growth and maintenance. Discovering drugs that block this tumor-induced development of new blood vessels (angiogenesis) is an im...
Arthur W. Mahoney, Brian G. Smith, Nicholas S. Fla...
ICASSP
2009
IEEE
14 years 4 months ago
A criterion for the enhancement of time-frequency masks in missing data recognition
Despite their effectiveness for robust speech processing, missing data techniques are vulnerable to errors in the classification of the input speech signal’s time-frequency poi...
Daniel Pullella, Roberto Togneri
DKE
2006
84views more  DKE 2006»
13 years 9 months ago
Mining configurable enterprise information systems
Process mining is the extraction of a process model from system logs. These logs have to meet minimum requirements, i.e. each event should refer to a case and a task. Many system ...
Monique H. Jansen-Vullers, Wil M. P. van der Aalst...