Sciweavers

2863 search results - page 420 / 573
» Comparing Operating Systems Using Robustness Benchmarks
Sort
View
ISDA
2005
IEEE
15 years 9 months ago
Smart Archive: a Component-based Data Mining Application Framework
Implementation of data mining applications is a challenging and complicated task, and the applications are often built from scratch. In this paper, a component-based application f...
Perttu Laurinen, Lauri Tuovinen, Juha Röning
USS
2010
15 years 1 months ago
VEX: Vetting Browser Extensions for Security Vulnerabilities
The browser has become the de facto platform for everyday computation. Among the many potential attacks that target or exploit browsers, vulnerabilities in browser extensions have...
Sruthi Bandhakavi, Samuel T. King, P. Madhusudan, ...
JBI
2002
105views Bioinformatics» more  JBI 2002»
15 years 3 months ago
Information extraction for enhanced access to disease outbreak reports
Document search is generally based on individual terms in the document. However, for collections within limited domains it is possible to provide more powerful access tools. This ...
Ralph Grishman, Silja Huttunen, Roman Yangarber
ATAL
2004
Springer
15 years 8 months ago
Embedded Agents for District Heating Management
We investigate the applicability of multi-agent systems as a control approach for district heating systems. The consumers, i.e., the heat exchange systems, in current district hea...
Paul Davidsson, Fredrik Wernstedt
143
Voted
CODES
2010
IEEE
15 years 1 months ago
A greedy buffer allocation algorithm for power-aware communication in body sensor networks
Monitoring human movements using wireless sensory devices promises to revolutionize the delivery of healthcare services. In spite of their potentials for many application domains,...
Hassan Ghasemzadeh, Roozbeh Jafari