Sciweavers

1298 search results - page 207 / 260
» Categorizing Vulnerabilities Using Data Clustering Technique...
Sort
View
143
Voted
PVLDB
2010
166views more  PVLDB 2010»
15 years 1 months ago
Towards Elastic Transactional Cloud Storage with Range Query Support
Cloud storage is an emerging infrastructure that offers Platforms as a Service (PaaS). On such platforms, storage and compute power are adjusted dynamically, and therefore it is i...
Hoang Tam Vo, Chun Chen, Beng Chin Ooi
144
Voted
ICDM
2006
IEEE
183views Data Mining» more  ICDM 2006»
15 years 9 months ago
Accelerating Newton Optimization for Log-Linear Models through Feature Redundancy
— Log-linear models are widely used for labeling feature vectors and graphical models, typically to estimate robust conditional distributions in presence of a large number of pot...
Arpit Mathur, Soumen Chakrabarti
ANOR
2010
139views more  ANOR 2010»
15 years 1 months ago
Some operations research methods for analyzing protein sequences and structures
Operations Research is probably one of the most successful fields of applied mathematics used in Economics, Physics, Chemistry, almost everywhere onehastoanalyzehugeamountsofdata.L...
Piotr Lukasiak, Jacek Blazewicz, Maciej Milostan
BMCBI
2008
129views more  BMCBI 2008»
15 years 3 months ago
EMAAS: An extensible grid-based Rich Internet Application for microarray data analysis and management
Background: Microarray experimentation requires the application of complex analysis methods as well as the use of non-trivial computer technologies to manage the resultant large d...
Geraint Barton, J. C. Abbott, Norie Chiba, D. W. H...
SEKE
2001
Springer
15 years 7 months ago
Gadget: A Tool for Extracting the Dynamic Structure of Java Programs
Source code analysis and inspection does not provide enough information to describe the structure of an objectoriented program completely because there are components and relation...
Juan Gargiulo, Spiros Mancoridis