Sciweavers

381 search results - page 66 / 77
» What Can Hierarchies Do for Data Streams
Sort
View
ISSTA
2009
ACM
14 years 2 months ago
Automatic system testing of programs without test oracles
Metamorphic testing has been shown to be a simple yet effective technique in addressing the quality assurance of applications that do not have test oracles, i.e., for which it is ...
Christian Murphy, Kuang Shen, Gail E. Kaiser
PERCOM
2011
ACM
12 years 11 months ago
PoX: Protecting users from malicious Facebook applications
Abstract—Online social networks such as Facebook, MySpace, and Orkut store large amounts of sensitive user data. While a user can legitimately assume that a social network provid...
Manuel Egele, Andreas Moser, Christopher Kruegel, ...
BMCBI
2007
83views more  BMCBI 2007»
13 years 7 months ago
Identification of sequence motifs significantly associated with antisense activity
Background: Predicting the suppression activity of antisense oligonucleotide sequences is the main goal of the rational design of nucleic acids. To create an effective predictive ...
Kyle A. McQuisten, Andrew S. Peek
ML
2010
ACM
127views Machine Learning» more  ML 2010»
13 years 6 months ago
Stability and model selection in k-means clustering
Abstract Clustering Stability methods are a family of widely used model selection techniques for data clustering. Their unifying theme is that an appropriate model should result in...
Ohad Shamir, Naftali Tishby
SISW
2003
IEEE
14 years 27 days ago
Memories: A Survey of Their Secure Uses in Smart Cards
— Smart cards are widely known for their tamper resistance, but only contain a small amount of memory. Though very small, this memory often contains highly valuable information (...
Michael Neve, Eric Peeters, David Samyde, Jean-Jac...