Sciweavers

4636 search results - page 737 / 928
» Application of Linguistic Techniques for Use Case Analysis
Sort
View
121
Voted
PODS
2007
ACM
203views Database» more  PODS 2007»
15 years 11 months ago
Decision trees for entity identification: approximation algorithms and hardness results
We consider the problem of constructing decision trees for entity identification from a given relational table. The input is a table containing information about a set of entities...
Venkatesan T. Chakaravarthy, Vinayaka Pandit, Samb...
WISEC
2009
ACM
15 years 5 months ago
Towards a theory for securing time synchronization in wireless sensor networks
Time synchronization in highly distributed wireless systems like sensor and ad hoc networks is extremely important in order to maintain a consistent notion of time throughout the ...
Murtuza Jadliwala, Qi Duan, Shambhu J. Upadhyaya, ...
64
Voted
BMCBI
2005
82views more  BMCBI 2005»
14 years 11 months ago
A novel method for prokaryotic promoter prediction based on DNA stability
Background: In the post-genomic era, correct gene prediction has become one of the biggest challenges in genome annotation. Improved promoter prediction methods can be one step to...
Aditi Kanhere, Manju Bansal
ICDE
2006
IEEE
138views Database» more  ICDE 2006»
16 years 14 days ago
SUBSKY: Efficient Computation of Skylines in Subspaces
Given a set of multi-dimensional points, the skyline contains the best points according to any preference function that is monotone on all axes. In practice, applications that req...
Yufei Tao, Xiaokui Xiao, Jian Pei
ICSE
2008
IEEE-ACM
15 years 12 months ago
Calysto: scalable and precise extended static checking
Automatically detecting bugs in programs has been a long-held goal in software engineering. Many techniques exist, trading-off varying levels of automation, thoroughness of covera...
Domagoj Babic, Alan J. Hu