Sciweavers

1947 search results - page 351 / 390
» On the Automatic Extraction of Data from the Hidden Web
Sort
View
USENIX
2008
13 years 11 months ago
Spectator: Detection and Containment of JavaScript Worms
Recent popularity of interactive AJAX-based Web 2.0 applications has given rise to a new breed of security threats: JavaScript worms. In this paper we propose Spectator, the first...
V. Benjamin Livshits, Weidong Cui
BMCBI
2008
130views more  BMCBI 2008»
13 years 9 months ago
An enhanced partial order curve comparison algorithm and its application to analyzing protein folding trajectories
Background: Understanding how proteins fold is essential to our quest in discovering how life works at the molecular level. Current computation power enables researchers to produc...
Hong Sun, Hakan Ferhatosmanoglu, Motonori Ota, Yus...
ICTAC
2004
Springer
14 years 2 months ago
A Proof of Weak Termination Providing the Right Way to Terminate
We give an inductive method for proving weak innermost termination of rule-based programs, from which we automatically infer, for each successful proof, a finite strategy for data...
Olivier Fissore, Isabelle Gnaedig, Hél&egra...
BMVC
2001
13 years 11 months ago
A Buyer's Guide to Euclidean Elliptical Cylindrical and Conical Surface Fitting
The ability to construct CAD or other object models from edge and range data has a fundamental meaning in building a recognition and positioning system. While the problem of model...
Petko Faber, Robert B. Fisher
BMCBI
2006
137views more  BMCBI 2006»
13 years 8 months ago
GOPET: A tool for automated predictions of Gene Ontology terms
Background: Vast progress in sequencing projects has called for annotation on a large scale. A Number of methods have been developed to address this challenging task. These method...
Arunachalam Vinayagam, Coral del Val, Falk Schuber...