Sciweavers

1937 search results - page 366 / 388
» Conditioning Probabilistic Databases
Sort
View
CIKM
2009
Springer
15 years 2 months ago
Answering XML queries using materialized views revisited
Answering queries using views is a well-established technique in databases. In this context, two outstanding problems can be formulated. The first one consists in deciding whethe...
Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang
ACISICIS
2009
IEEE
15 years 1 months ago
A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning
A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel proces...
Dacheng Xu, Bailiang Li, Anton Nijholt
DIMVA
2008
14 years 11 months ago
Embedded Malware Detection Using Markov n-Grams
Embedded malware is a recently discovered security threat that allows malcode to be hidden inside a benign file. It has been shown that embedded malware is not detected by commerci...
M. Zubair Shafiq, Syed Ali Khayam, Muddassar Faroo...
CASCON
1992
163views Education» more  CASCON 1992»
14 years 11 months ago
Practical metaprogramming
Metaprogramming is the process of specifying generic software source templates from which classes of software components, or parts thereof, can be automatically instantiated to pr...
James R. Cordy, Medha Shukla
BMCBI
2010
147views more  BMCBI 2010»
14 years 10 months ago
Indirect two-sided relative ranking: a robust similarity measure for gene expression data
Background: There is a large amount of gene expression data that exists in the public domain. This data has been generated under a variety of experimental conditions. Unfortunatel...
Louis Licamele, Lise Getoor