Sciweavers

926 search results - page 173 / 186
» An Approach for Extracting Workflows from E-Commerce Applica...
Sort
View
CASES
2004
ACM
15 years 7 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
126
Voted
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
15 years 3 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
BMCBI
2010
167views more  BMCBI 2010»
15 years 1 months ago
Bi-directional gene set enrichment and canonical correlation analysis identify key diet-sensitive pathways and biomarkers of met
Background: Currently, a number of bioinformatics methods are available to generate appropriate lists of genes from a microarray experiment. While these lists represent an accurat...
Melissa J. Morine, Jolene McMonagle, Sinead Toomey...
SIGMOD
2008
ACM
215views Database» more  SIGMOD 2008»
16 years 1 months ago
CSV: visualizing and mining cohesive subgraphs
Extracting dense sub-components from graphs efficiently is an important objective in a wide range of application domains ranging from social network analysis to biological network...
Nan Wang, Srinivasan Parthasarathy, Kian-Lee Tan, ...
PKDD
1998
Springer
273views Data Mining» more  PKDD 1998»
15 years 6 months ago
TextVis: An Integrated Visual Environment for Text Mining
TextVis is a visual data mining system for document collections. Such a collection represents an application domain, and the primary goal of the system is to derive patterns that p...
David Landau, Ronen Feldman, Yonatan Aumann, Moshe...