Sciweavers

495 search results - page 80 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
CSCWD
2007
Springer
14 years 3 months ago
An Integration Life Cycle for Semantic Web Services Composition
Business applications are more and more often developed on the basis of Web services. The aim is to provide platform independence and loose coupling between business applications ...
Muhammad Ahtisham Aslam, Jun Shen, Sören Auer...
RECOMB
2002
Springer
14 years 10 months ago
Discovering local structure in gene expression data: the order-preserving submatrix problem
This paper concerns the discovery of patterns in gene expression matrices, in which each element gives the expression level of a given gene in a given experiment. Most existing me...
Amir Ben-Dor, Benny Chor, Richard M. Karp, Zohar Y...
ICCV
2011
IEEE
12 years 9 months ago
Discovering Object Instances from Scenes of Daily Living
We propose an approach to identify and segment objects from scenes that a person (or robot) encounters in Activities of Daily Living (ADL). Images collected in those cluttered sce...
Hongwen Kang, Martial Hebert, Takeo Kanade
WINE
2005
Springer
179views Economy» more  WINE 2005»
14 years 3 months ago
A Graph-Theoretic Network Security Game
Consider a network vulnerable to viral infection. The system security software can guarantee safety only to a limited part of the network. Such limitations result from economy cos...
Marios Mavronicolas, Vicky G. Papadopoulou, Anna P...
ICDE
2002
IEEE
136views Database» more  ICDE 2002»
14 years 11 months ago
Mixing Querying and Navigation in MIX
Web-based information systems provide to their users the ability to interleave querying and browsing during their information discovery efforts. The MIX system provides an API cal...
Pratik Mukhopadhyay, Yannis Papakonstantinou