Sciweavers

495 search results - page 88 / 99
» Modeling the Vulnerability Discovery Process
Sort
View
EUROPAR
2003
Springer
14 years 26 days ago
Exploring the Catallactic Coordination Approach for Peer-to-Peer Systems
Efficient discovery and resource allocation is one of the challenges of current Peer-to-Peer systems. In centralized approaches, the user requests can be matched to the fastest, ch...
Oscar Ardaiz, Pau Artigas, Torsten Eymann, Felix F...
RECOMB
2001
Springer
14 years 2 days ago
Extracting structural information using time-frequency analysis of protein NMR data
High-throughput, data-directed computational protocols for Structural Genomics (or Proteomics) are required in order to evaluate the protein products of genes for structure and fu...
Christopher James Langmead, Bruce Randall Donald
ACMDIS
2000
ACM
14 years 1 days ago
Meta-Design: Design for Designers
One fundamental challenge for the design of the interactive systems of the future is to invent and design environments and cultures in which humans can express themselves and enga...
Gerhard Fischer, Eric Scharff
CIKM
1999
Springer
13 years 12 months ago
Mining Inter-Transaction Associations with Templates
Multi-dimensional, inter-transaction association rules extend the traditional association rules to describe more general associations among items with multiple properties cross tr...
Ling Feng, Hongjun Lu, Jeffrey Xu Yu, Jiawei Han
ECAL
1999
Springer
13 years 12 months ago
How Symbiosis Can Guide Evolution
Hinton and Nowlan have demonstrated a model of how lifetime plasticity can guide evolution. They show how acquired traits change the shape of the reward landscape in which subseque...
Richard A. Watson, Jordan B. Pollack