Sciweavers

3706 search results - page 614 / 742
» The Transformational Approach to Program Development
Sort
View
KDD
1997
ACM
184views Data Mining» more  KDD 1997»
14 years 3 days ago
JAM: Java Agents for Meta-Learning over Distributed Databases
In this paper, we describe the JAM system, a distributed, scalable and portable agent-based data mining system that employs a general approach to scaling data mining applications ...
Salvatore J. Stolfo, Andreas L. Prodromidis, Shell...
BMCBI
2008
155views more  BMCBI 2008»
13 years 8 months ago
AMMOS: Automated Molecular Mechanics Optimization tool for in silico Screening
Background: Virtual or in silico ligand screening combined with other computational methods is one of the most promising methods to search for new lead compounds, thereby greatly ...
Tania Pencheva, David Lagorce, Ilza Pajeva, Bruno ...
SAC
2008
ACM
13 years 7 months ago
Implementing Java modeling language contracts with AspectJ
The Java Modeling Language (JML) is a behavioral interface specification language (BISL) designed for Java. It was developed to improve functional software correctness of Java app...
Henrique Rebêlo, Sérgio Soares, Ricar...
LOGCOM
2010
154views more  LOGCOM 2010»
13 years 2 months ago
Collaborative Runtime Verification with Tracematches
Perfect pre-deployment test coverage is notoriously difficult to achieve for large applications. Given enough end users, however, many more test cases will be encountered during a...
Eric Bodden, Laurie J. Hendren, Patrick Lam, Ondre...
CCS
2005
ACM
14 years 1 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar