Sciweavers

488 search results - page 51 / 98
» REDUCE Meets CAMAL
Sort
View
TPDS
1998
112views more  TPDS 1998»
13 years 7 months ago
Parallel Computation in Biological Sequence Analysis
—A massive volume of biological sequence data is available in over 36 different databases worldwide, including the sequence data generated by the Human Genome project. These data...
Tieng K. Yap, Ophir Frieder, Robert L. Martino
TCSV
2002
124views more  TCSV 2002»
13 years 7 months ago
Efficient moving object segmentation algorithm using background registration technique
An efficient moving object segmentation algorithm suitable for real-time content-based multimedia communication systems is proposed in this paper. First, a background registration ...
Shao-Yi Chien, Shyh-Yih Ma, Liang-Gee Chen
ICFEM
2010
Springer
13 years 6 months ago
Verifying Heap-Manipulating Programs with Unknown Procedure Calls
Abstract. Verification of programs with invocations to unknown procedures is a practical problem, because in many scenarios not all codes of programs to be verified are available...
Shengchao Qin, Chenguang Luo, Guanhua He, Florin C...
IJSNET
2010
122views more  IJSNET 2010»
13 years 5 months ago
Ensuring high sensor data quality through use of online outlier detection techniques
: Data collected by Wireless Sensor Networks (WSNs) are inherently unreliable. Therefore, to ensure high data quality, secure monitoring, and reliable detection of interesting and ...
Yang Zhang, Nirvana Meratnia, Paul J. M. Havinga
INFOCOM
2010
IEEE
13 years 5 months ago
Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue
—Collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defences have largely b...
Daniele Quercia, Stephen Hailes