Sciweavers

5159 search results - page 1004 / 1032
» Structural Testing of Executables
Sort
View
KDD
2010
ACM
247views Data Mining» more  KDD 2010»
13 years 9 months ago
Metric forensics: a multi-level approach for mining volatile graphs
Advances in data collection and storage capacity have made it increasingly possible to collect highly volatile graph data for analysis. Existing graph analysis techniques are not ...
Keith Henderson, Tina Eliassi-Rad, Christos Falout...
CIKM
2008
Springer
13 years 9 months ago
SNIF TOOL: sniffing for patterns in continuous streams
Continuous time-series sequence matching, specifically, matching a numeric live stream against a set of predefined pattern sequences, is critical for domains ranging from fire spr...
Abhishek Mukherji, Elke A. Rundensteiner, David C....
CIKM
2008
Springer
13 years 9 months ago
Viability of in-house datamarting approaches for population genetics analysis of snp genotypes
Background: Databases containing very large amounts of SNP (Single Nucleotide Polymorphism) data are now freely available for researchers interested in medical and/or population g...
Jorge Amigo, Christopher Phillips, Antonio Salas
ASSETS
2005
ACM
13 years 9 months ago
Automatic production of tactile graphics from scalable vector graphics
This paper presents a method to convert vector graphics into tactile representations for the blind. Generating tactile pictures from vector graphics is an important effort to bri...
Stephen E. Krufka, Kenneth E. Barner
CASES
2005
ACM
13 years 9 months ago
Segment protection for embedded systems using run-time checks
The lack of virtual memory protection is a serious source of unreliability in many embedded systems. Without the segment-level protection it provides, these systems are subject to...
Matthew Simpson, Bhuvan Middha, Rajeev Barua
« Prev « First page 1004 / 1032 Last » Next »