Sciweavers

9572 search results - page 1823 / 1915
» Cover Algorithms and Their Combination
Sort
View
OOPSLA
2007
Springer
15 years 6 months ago
The design and implementation of formal monitoring techniques
In runtime monitoring, a programmer specifies a piece of code to execute when a trace of events occurs during program execution. Previous and related work has shown that runtime m...
Eric Bodden
97
Voted
PEPM
2007
ACM
15 years 6 months ago
Behavioral similarity matching using concrete source code templates in logic queries
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identification of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...
105
Voted
VLDB
2007
ACM
137views Database» more  VLDB 2007»
15 years 6 months ago
Detecting Attribute Dependencies from Query Feedback
Real-world datasets exhibit a complex dependency structure among the data attributes. Learning this structure is a key task in automatic statistics configuration for query optimi...
Peter J. Haas, Fabian Hueske, Volker Markl
85
Voted
WABI
2007
Springer
15 years 6 months ago
Shotgun Protein Sequencing
Although snake venom proteins have been proven instrumental in the design of blood clotting and cytostatic breast cancer drugs, the main method in use to sequence these unknown pr...
Pavel A. Pevzner
121
Voted
WISTP
2007
Springer
15 years 6 months ago
Mobile Phones as Secure Gateways for Message-Based Ubiquitous Communication
Abstract. For ubiquitous communication self-organising adhoc networks become more and more important. We consider mobile phones as appropriate secure gateways to provide access to ...
Walter Bamberger, Oliver Welter, Stephan Spitz
« Prev « First page 1823 / 1915 Last » Next »