Sciweavers

2250 search results - page 123 / 450
» Authorizing applications in singularity
Sort
View
ERSHOV
2009
Springer
15 years 1 months ago
Anti-unification Algorithms and Their Applications in Program Analysis
A term t is called a template of terms t1 and t2 iff t1 = t1 and t2 = t2, for some substitutions 1 and 2. A template t of t1 and t2 is called the most specific iff for any template...
Peter E. Bulychev, Egor V. Kostylev, Vladimir A. Z...
SDM
2010
SIAM
256views Data Mining» more  SDM 2010»
14 years 11 months ago
The Application of Statistical Relational Learning to a Database of Criminal and Terrorist Activity
We apply statistical relational learning to a database of criminal and terrorist activity to predict attributes and event outcomes. The database stems from a collection of news ar...
B. Delaney, Andrew S. Fast, W. M. Campbell, C. J. ...
FLAIRS
2004
14 years 11 months ago
An Application of Neural Networks to Sequence Analysis and Genre Identification
This study borrowed sequence analysis techniques from the genetic sciences and applied them to a similar problem in email filtering and web searching. Genre identification is the ...
David Bisant
USENIX
1993
14 years 11 months ago
AudioFile: A Network-Transparent System for Distributed Audio Applications
AudioFile is a portable, device-independent, network-transparent system for computer audio systems. to the X Window System, it provides an abstract audio device interface with a s...
Jim Gettys, Thoms M. Levergood, Andrew C. Payne, L...
BMCBI
2007
154views more  BMCBI 2007»
14 years 10 months ago
Bounds on the distribution of the number of gaps when circles and lines are covered by fragments: Theory and practical applicati
Background: The question of how a circle or line segment becomes covered when random arcs are marked off has arisen repeatedly in bioinformatics. The number of uncovered gaps is o...
John Moriarty, Julian R. Marchesi, Anthony Metcalf...