Sciweavers

21342 search results - page 3772 / 4269
» A Structured Language Model
Sort
View
ISSTA
2012
ACM
13 years 7 months ago
Measuring enforcement windows with symbolic trace interpretation: what well-behaved programs say
A static analysis design is sufficient if it can prove the property of interest with an acceptable number of false alarms. Ultimately, the only way to confirm that an analysis d...
Devin Coughlin, Bor-Yuh Evan Chang, Amer Diwan, Je...
TON
2012
13 years 7 months ago
Opportunistic Flow-Level Latency Estimation Using Consistent NetFlow
—The inherent measurement support in routers (SNMP counters or NetFlow) is not sufficient to diagnose performance problems in IP networks, especially for flow-specific problem...
Myungjin Lee, Nick G. Duffield, Ramana Rao Kompell...
BMCBI
2010
165views more  BMCBI 2010»
15 years 4 months ago
MTar: a computational microRNA target prediction architecture for human transcriptome
Background: MicroRNAs (miRNAs) play an essential task in gene regulatory networks by inhibiting the expression of target mRNAs. As their mRNA targets are genes involved in importa...
Vinod Chandra, Reshmi Girijadevi, Achuthsankar S. ...
CVPR
1998
IEEE
16 years 6 months ago
A Methodology for Deriving Probabilistic Correctness Measures from Recognizers
This paper describes the derivation of probability of correctness from scores assigned by most recognizers. Motivation for this research is three-fold: i probability values can be...
Djamel Bouchaffra, Venu Govindaraju, Sargur N. Sri...
ICDE
2009
IEEE
143views Database» more  ICDE 2009»
16 years 6 months ago
Auditing a Database under Retention Restrictions
Auditing the changes to a database is critical for identifying malicious behavior, maintaining data quality, and improving system performance. But an accurate audit log is a histor...
Wentian Lu, Gerome Miklau
« Prev « First page 3772 / 4269 Last » Next »