Sciweavers

289 search results - page 50 / 58
» Teaching data structure design patterns
Sort
View
NSPW
2004
ACM
14 years 1 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
LREC
2010
169views Education» more  LREC 2010»
13 years 9 months ago
An LMF-based Web Service for Accessing WordNet-type Semantic Lexicons
This paper describes a Web service for accessing WordNet-type semantic lexicons. The central idea behind the service design is: given a query, the primary functionality of lexicon...
Savas Ali Bora, Yoshihiko Hayashi, Monica Monachin...
ACISP
1997
Springer
13 years 11 months ago
Enabling Technology for the Trading of MPEG-encoded Video
tracts, pp. 11-17. (http://www.qucis.queens.ca/achallc97/papers/p028.html) Alexa, Melina; Rostek, Lothar Pattern Concordances - TATOE calls XGrammar. Presented at ACH -ALLC97, King...
Jana Dittmann, Arnd Steinmetz
MICRO
2007
IEEE
129views Hardware» more  MICRO 2007»
14 years 1 months ago
A Framework for Coarse-Grain Optimizations in the On-Chip Memory Hierarchy
Current on-chip block-centric memory hierarchies exploit access patterns at the fine-grain scale of small blocks. Several recently proposed techniques for coherence traffic reduct...
Jason Zebchuk, Elham Safi, Andreas Moshovos
BMCBI
2010
124views more  BMCBI 2010»
13 years 7 months ago
A factor model to analyze heterogeneity in gene expression
Background: Microarray technology allows the simultaneous analysis of thousands of genes within a single experiment. Significance analyses of transcriptomic data ignore the gene d...
Yuna Blum, Guillaume Le Mignon, Sandrine Lagarrigu...