Sciweavers

1164 search results - page 231 / 233
» Using CBR for Semantic Analysis of Software Specifications
Sort
View
MOBISYS
2005
ACM
14 years 5 months ago
Shake them up!: a movement-based pairing protocol for CPU-constrained devices
This paper presents a new pairing protocol that allows two CPU-constrained wireless devices Alice and Bob to establish a shared secret at a very low cost. To our knowledge, this i...
Claude Castelluccia, Pars Mutaf
NSPW
2003
ACM
13 years 11 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CIKM
2001
Springer
13 years 10 months ago
X007: Applying 007 Benchmark to XML Query Processing Tool
If XML is to play the critical role of the lingua franca for Internet data interchange that many predict, it is necessary to start designing and adopting benchmarks allowing the c...
Stéphane Bressan, Gillian Dobbie, Zoé...
CLEF
2009
Springer
13 years 6 months ago
Where in the Wikipedia Is That Answer? The XLDB at the GikiCLEF 2009 Task
GikiCLEF focused on the evaluation of the reasoning capabilities of systems to provide right answers for geographically-challenging topics. As we did not have previous experience ...
Nuno Cardoso, David Batista, Francisco J. Ló...
BMCBI
2008
118views more  BMCBI 2008»
13 years 5 months ago
Evaluation of phylogenetic footprint discovery for predicting bacterial cis-regulatory elements and revealing their evolution
Background: The detection of conserved motifs in promoters of orthologous genes (phylogenetic footprints) has become a common strategy to predict cis-acting regulatory elements. S...
Rekin's Janky, Jacques van Helden