Sciweavers

2851 search results - page 509 / 571
» A Knowledge Based Approach on Educational Metadata Use
Sort
View
APBC
2004
173views Bioinformatics» more  APBC 2004»
15 years 1 months ago
RNA Secondary Structure Prediction with Simple Pseudoknots
Pseudoknots are widely occurring structural motifs in RNA. Pseudoknots have been shown to be functionally important in different RNAs which play regulatory, catalytic, or structur...
Jitender S. Deogun, Ruben Donts, Olga Komina, Fang...
CIKM
2004
Springer
15 years 3 months ago
Taxonomy-driven computation of product recommendations
Recommender systems have been subject to an enormous rise in popularity and research interest over the last ten years. At the same time, very large taxonomies for product classifi...
Cai-Nicolas Ziegler, Georg Lausen, Lars Schmidt-Th...
ICTAC
2009
Springer
14 years 9 months ago
Integration Testing from Structured First-Order Specifications via Deduction Modulo
Testing from first-order specifications has mainly been studied for flat specifications, that are specifications of a single software module. However, the specifications of large s...
Delphine Longuet, Marc Aiguier
WWW
2009
ACM
16 years 15 days ago
Co-browsing dynamic web pages
Collaborative browsing, or co-browsing, is the co-navigation of the web with other people at-a-distance, supported by software that takes care of synchronizing the browsers. Curre...
Dietwig Lowet, Daniel Goergen
ACSAC
2008
IEEE
15 years 6 months ago
Systematic Signature Engineering by Re-use of Snort Signatures
Most intrusion detection systems apply the misuse detection approach. Misuse detection compares recorded audit data with predefined patterns denoted as signatures. A signature is ...
Sebastian Schmerl, Hartmut König, Ulrich Fleg...