Sciweavers

3389 search results - page 629 / 678
» Perspectives on system identification
Sort
View
WWW
2006
ACM
14 years 8 months ago
Knowledge modeling and its application in life sciences: a tale of two ontologies
High throughput glycoproteomics, similar to genomics and proteomics, involves extremely large volumes of distributed, heterogeneous data as a basis for identification and quantifi...
Satya Sanket Sahoo, Christopher Thomas, Amit P. Sh...
ICFP
2009
ACM
14 years 8 months ago
Causal commutative arrows and their optimization
re a popular form of abstract computation. Being more general than monads, they are more broadly applicable, and in parare a good abstraction for signal processing and dataflow co...
Hai Liu, Eric Cheng, Paul Hudak
SIGMOD
2008
ACM
206views Database» more  SIGMOD 2008»
14 years 8 months ago
Ad-hoc aggregations of ranked lists in the presence of hierarchies
A variety of web sites and web based services produce textual lists at varying time granularities ranked according to several criteria. For example, Google Trends produces lists o...
Nilesh Bansal, Sudipto Guha, Nick Koudas
ICSE
2007
IEEE-ACM
14 years 8 months ago
Automated Inference of Pointcuts in Aspect-Oriented Refactoring
Software refactoring is the process of reorganizing the internal structure of code while preserving the external behavior. Aspect-Oriented Programming (AOP) provides new modulariz...
Prasanth Anbalagan, Tao Xie
AP2PS
2009
IEEE
14 years 2 months ago
Detection of Encrypted Traffic in eDonkey Network through Application Signatures
—Peer-to-peer file sharing applications became very popular, being responsible for a large percentage of the network traffic. However, peer-to-peer traffic may compromise the per...
Mário M. Freire, David A. Carvalho, Manuela...