Sciweavers

53327 search results - page 10518 / 10666
» or 2007
Sort
View
DIMVA
2008
13 years 10 months ago
Data Space Randomization
Over the past several years, US-CERT advisories, as well as most critical updates from software vendors, have been due to memory corruption vulnerabilities such as buffer overflo...
Sandeep Bhatkar, R. Sekar
FOCS
2008
IEEE
13 years 10 months ago
Minimizing Movement in Mobile Facility Location Problems
In the mobile facility location problem, which is a variant of the classical Uncapacitated Facility Location and kMedian problems, each facility and client is assigned to a start ...
Zachary Friggstad, Mohammad R. Salavatipour
GG
2008
Springer
13 years 10 months ago
Graph-Based Tools: The Contest
This event is the second instance of the contest for graph transformation-based tools, which was first held as part of the AGTIVE workshop. The aim is to stimulate tool developmen...
Arend Rensink, Pieter Van Gorp
BIBM
2007
IEEE
133views Bioinformatics» more  BIBM 2007»
13 years 9 months ago
Mining Clinical Data with a Temporal Dimension: A Case Study
Clinical databases store large amounts of information about patients and their medical conditions. Data mining techniques can extract relationships and patterns holding in this we...
Michele Berlingerio, Francesco Bonchi, Fosca Giann...
CIDM
2007
IEEE
13 years 9 months ago
SSM : A Frequent Sequential Data Stream Patterns Miner
Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering c...
C. I. Ezeife, Mostafa Monwar
« Prev « First page 10518 / 10666 Last » Next »