Sciweavers

3604 search results - page 143 / 721
» All Common Subsequences
Sort
View
COMCOM
2004
95views more  COMCOM 2004»
15 years 4 months ago
A distributed middleware infrastructure for personalized services
In this paper, we present an overview of extensible Retrieval, Annotation and Caching Engine (eRACE), a modular and distributed intermediary infrastructure that collects informati...
Marios D. Dikaiakos, Demetrios Zeinalipour-Yazti
COMCOM
2004
79views more  COMCOM 2004»
15 years 4 months ago
Anomaly detection methods in wired networks: a survey and taxonomy
Despite the advances reached along the last 20 years, anomaly detection in network behavior is still an immature technology, and the shortage of commercial tools thus corroborates...
Juan M. Estévez-Tapiador, Pedro Garcia-Teod...
JECR
2000
136views more  JECR 2000»
15 years 4 months ago
Modeling the Supply-Demand Interaction in Electronic Commerce: A Bi-Level Programming Approach
The purpose of this paper consists in establishing the model for the supply-demand interaction in the age of electronic commerce. First of all, the study uses the individual objec...
Daniel Y. Shee, Tzung-I Tang, Gwo-Hshiung Tzeng
NAR
2000
85views more  NAR 2000»
15 years 4 months ago
MitoNuc and MitoAln: two related databases of nuclear genes coding for mitochondrial proteins
Mitochondria, besides their central role in energy metabolism, have recently been found to be involved in a number of basic processes of cell life and to contribute to the pathoge...
Graziano Pesole, Carmela Gissi, Domenico Catalano,...
CORR
1998
Springer
82views Education» more  CORR 1998»
15 years 4 months ago
Name Strategy: Its Existence and Implications
It is argued that colour name strategy, object name strategy, and chunking strategy in memory are all aspects of the same general phenomena, called stereotyping, and this in turn ...
Mark D. Roberts