Sciweavers

2324 search results - page 272 / 465
» Benchmark Generation Using Domain Specific Modeling
Sort
View
VLDB
2004
ACM
104views Database» more  VLDB 2004»
16 years 2 months ago
Retrieval effectiveness of an ontology-based model for information selection
Technology in the field of digital media generates huge amounts of nontextual information, audio, video, and images, along with more familiar textual information. The potential for...
Latifur Khan, Dennis McLeod, Eduard H. Hovy
CARDIS
2008
Springer
113views Hardware» more  CARDIS 2008»
15 years 4 months ago
The Trusted Execution Module: Commodity General-Purpose Trusted Computing
This paper introduces the Trusted Execution Module (TEM); a high-level specification for a commodity chip that can execute usersupplied procedures in a trusted environment. The TEM...
Victor Costan, Luis F. G. Sarmenta, Marten van Dij...
CASCON
1996
148views Education» more  CASCON 1996»
15 years 3 months ago
Reuse in the application layer
Today's advanced CASE tools, combining the building-block and generative approaches to software reuse, are effective for reuse of software components and procedures in the pr...
Hirotomo Okuno, Hideki Matsumoto, Hironori Asai, M...
BMCBI
2006
143views more  BMCBI 2006»
15 years 2 months ago
Application of protein structure alignments to iterated hidden Markov model protocols for structure prediction
Background: One of the most powerful methods for the prediction of protein structure from sequence information alone is the iterative construction of profile-type models. Because ...
Eric D. Scheeff, Philip E. Bourne
BIOINFORMATICS
2006
101views more  BIOINFORMATICS 2006»
15 years 2 months ago
A lock-and-key model for protein-protein interactions
Motivation: Protein-protein interaction networks are one of the major post-genomic data sources available to molecular biologists. They provide a comprehensive view of the global ...
Julie L. Morrison, Rainer Breitling, Desmond J. Hi...