Sciweavers

410 search results - page 68 / 82
» Structural Comparison of Executable Objects
Sort
View
CODES
2005
IEEE
14 years 1 months ago
Enhancing security through hardware-assisted run-time validation of program data properties
The growing number of information security breaches in electronic and computing systems calls for new design paradigms that consider security as a primary design objective. This i...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
IS
2010
13 years 6 months ago
Tree pattern mining with tree automata constraints
Most work on pattern mining focuses on simple data structures such as itemsets and sequences of itemsets. However, a lot of recent applications dealing with complex data like chem...
Sandra de Amo, Nyara A. Silva, Ronaldo P. Silva, F...
SIGMOD
2005
ACM
99views Database» more  SIGMOD 2005»
14 years 8 months ago
WOODSS and the Web: annotating and reusing scientific workflows
This paper discusses ongoing research on scientific workflows at the Institute of Computing, University of Campinas (IC - UNICAMP) Brazil. Our projects with bio-scientists have le...
Claudia Bauzer Medeiros, José de Jesús Pérez Al...
TKDE
1998
139views more  TKDE 1998»
13 years 7 months ago
Distributed Optimistic Concurrency Control Methods for High-Performance Transaction Processing
—There is an ever-increasing demand for more complex transactions and higher throughputs in transaction processing systems leading to higher degrees of transaction concurrency an...
Alexander Thomasian
ISBI
2006
IEEE
14 years 8 months ago
Molecular image registration using mutual information and differential evolution optimization
In this work we propose a novel rigid image registration approach to determine the position of high-resolution molecular structures in medium-resolution macromolecular complexes. ...
Bartosz Telenczuk, María J. Ledesma-Carbayo...