Sciweavers

6409 search results - page 1228 / 1282
» A Computational Algorithm for Origami Design
Sort
View
WABI
2009
Springer
127views Bioinformatics» more  WABI 2009»
15 years 4 months ago
Constructing Majority-Rule Supertrees
Background: Supertree methods combine the phylogenetic information from multiple partially-overlapping trees into a larger phylogenetic tree called a supertree. Several supertree ...
Jianrong Dong, David Fernández-Baca, Fred R...
RECSYS
2009
ACM
15 years 4 months ago
Conceptual recommender system for CiteSeerX
Short search engine queries do not provide contextual information, making it difficult for traditional search engines to understand what users are really requesting. One approach ...
Ajith Kodakateri Pudhiyaveetil, Susan Gauch, Hiep ...
SOUPS
2009
ACM
15 years 4 months ago
Challenges in supporting end-user privacy and security management with social navigation
Social navigation is a promising approach for supporting privacy and security management. By aggregating and presenting the choices made by others, social navigation systems can p...
Jeremy Goecks, W. Keith Edwards, Elizabeth D. Myna...
NDSS
2008
IEEE
15 years 4 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
PDP
2008
IEEE
15 years 4 months ago
Behavioural Skeletons in GCM: Autonomic Management of Grid Components
Autonomic management can be used to improve the QoS provided by parallel/distributed applications. We discuss behavioural skeletons introduced in earlier work: rather than relying...
Marco Aldinucci, Sonia Campa, Marco Danelutto, Mar...
« Prev « First page 1228 / 1282 Last » Next »