Sciweavers

842 search results - page 139 / 169
» Search Control Techniques for Planning
Sort
View
CSB
2005
IEEE
133views Bioinformatics» more  CSB 2005»
14 years 2 months ago
Investigation into Biomedical Literature Classification Using Support Vector Machines
Specific topic search in the PubMed Database, one of the most important information resources for scientific community, presents a big challenge to the users. The researcher typic...
Nalini Polavarapu, Shamkant B. Navathe, Ramprasad ...
INFOVIS
2005
IEEE
14 years 2 months ago
Vizster: Visualizing Online Social Networks
Recent years have witnessed the dramatic popularity of online social networking services, in which millions of members publicly articulate mutual "friendship" relations....
Jeffrey Heer, Danah Boyd
GECCO
2007
Springer
215views Optimization» more  GECCO 2007»
14 years 22 days ago
Finding safety errors with ACO
Model Checking is a well-known and fully automatic technique for checking software properties, usually given as temporal logic formulae on the program variables. Most model checke...
Enrique Alba, J. Francisco Chicano
FTCS
1998
114views more  FTCS 1998»
13 years 10 months ago
Verification of a Safety-Critical Railway Interlocking System with Real-Time Constraints
Ensuring the correctness of computer systems used in lifecritical applications is very difficult. The most commonly used verification methods, simulation and testing, are not exha...
Vicky Hartonas-Garmhausen, Sérgio Vale Agui...
NDSS
2008
IEEE
14 years 3 months ago
Analysis-Resistant Malware
Traditionally, techniques for computing on encrypted data have been proposed with privacy preserving applications in mind. Several current cryptosystems support a homomorphic oper...
John Bethencourt, Dawn Song, Brent Waters