Sciweavers

1012 search results - page 145 / 203
» What Robots Can Do
Sort
View
CHI
2004
ACM
16 years 4 months ago
Gooey interfaces: an approach for rapidly repurposing digital content
With the acceleration of technological development we are reaching the point where our systems and their user interfaces become to some degree outdated 'legacy systems' ...
Les Nelson, Elizabeth F. Churchill, Laurent Denoue...
RECOMB
2006
Springer
16 years 4 months ago
Leveraging Information Across HLA Alleles/Supertypes Improves Epitope Prediction
We present a model for predicting HLA class I restricted CTL epitopes. In contrast to almost all other work in this area, we train a single model on epitopes from all HLA alleles a...
David Heckerman, Carl Myers Kadie, Jennifer Listga...
OSDI
2002
ACM
16 years 4 months ago
ReVirt: Enabling Intrusion Analysis Through Virtual-Machine Logging and Replay
Current system loggers have two problems: they depend on the integrity of the operating system being logged, and they do not save sufficient information to replay and analyze atta...
George W. Dunlap, Samuel T. King, Sukru Cinar, Mur...
119
Voted
ICSE
2004
IEEE-ACM
16 years 4 months ago
Evidence-Based Software Engineering
Objective: Our objective is to describe how software engineering might benefit from an evidence-based approach and to identify the potential difficulties associated with the appro...
Barbara A. Kitchenham, Magne Jørgensen, Tor...
SDM
2009
SIAM
173views Data Mining» more  SDM 2009»
16 years 1 months ago
Discretized Spatio-Temporal Scan Window.
The focus of this paper is the discovery of anomalous spatio-temporal windows. We propose a Discretized SpatioTemporal Scan Window approach to address the question of how we can t...
Aryya Gangopadhyay, Seyed H. Mohammadi, Vandana Pu...