Sciweavers

1522 search results - page 301 / 305
» Control-Driven Tasks: Modeling and Analysis
Sort
View
91
Voted
ESORICS
2009
Springer
16 years 7 days ago
Enabling Public Verifiability and Data Dynamics for Storage Security in Cloud Computing
Cloud Computing has been envisioned as the next-generation architecture of IT Enterprise. It moves the application software and databases to the centralized large data centers, whe...
Qian Wang, Cong Wang, Jin Li, Kui Ren, Wenjing Lou
KDD
2007
ACM
136views Data Mining» more  KDD 2007»
16 years 1 days ago
Information genealogy: uncovering the flow of ideas in non-hyperlinked document databases
We now have incrementally-grown databases of text documents ranging back for over a decade in areas ranging from personal email, to news-articles and conference proceedings. While...
Benyah Shaparenko, Thorsten Joachims
KDD
2005
ACM
125views Data Mining» more  KDD 2005»
16 years 1 days ago
Email data cleaning
Addressed in this paper is the issue of `email data cleaning' for text mining. Many text mining applications need take emails as input. Email data is usually noisy and thus i...
Jie Tang, Hang Li, Yunbo Cao, ZhaoHui Tang
98
Voted
RECOMB
2006
Springer
15 years 12 months ago
A Study of Accessible Motifs and RNA Folding Complexity
mRNA molecules are folded in the cells and therefore many of their substrings may actually be inaccessible to protein and microRNA binding. The need to apply an accessability crite...
Ydo Wexler, Chaya Ben-Zaken Zilberstein, Michal Zi...
ICIAP
2007
ACM
15 years 11 months ago
Natural scenes categorization by hierarchical extraction of typicality patterns
Natural scene categorization of images represents a very useful task for automatic image analysis systems in a wide variety of applications. In the literature, several methods hav...
Alessandro Perina, Marco Cristani, Vittorio Murino