Sciweavers

6318 search results - page 1232 / 1264
» Data Leakage Detection
Sort
View
BIRD
2008
Springer
162views Bioinformatics» more  BIRD 2008»
14 years 11 months ago
Suffix Tree Characterization of Maximal Motifs in Biological Sequences
Finding motifs in biological sequences is one of the most intriguing problems for string algorithms designers due to, on the one hand, the numerous applications of this problem in...
Maria Federico, Nadia Pisanti
CASES
2005
ACM
14 years 11 months ago
SECA: security-enhanced communication architecture
In this work, we propose and investigate the idea of enhancing a System-on-Chip (SoC) communication architecture (the fabric that integrates system components and carries the comm...
Joel Coburn, Srivaths Ravi, Anand Raghunathan, Sri...
PERVASIVE
2010
Springer
14 years 11 months ago
Specification and Verification of Complex Location Events with Panoramic
We present the design and evaluation of Panoramic, a tool that enables end-users to specify and verify an important family of complex location events. Our approach aims to reduce o...
Evan Welbourne, Magdalena Balazinska, Gaetano Borr...
ECLIPSE
2005
ACM
14 years 11 months ago
Coping with an open bug repository
Most open source software development projects include an open bug repository—one to which users of the software can gain full access—that is used to report and track problems...
John Anvik, Lyndon Hiew, Gail C. Murphy
AUTONOMICS
2008
ACM
14 years 11 months ago
MWM: a map-based world model for wireless sensor networks
A prominent functionality of a Wireless Sensor Network (WSN) is environmental monitoring. For this purpose the WSN creates a model for the real world by using abstractions to pars...
Abdelmajid Khelil, Faisal Karim Shaikh, Brahim Aya...
« Prev « First page 1232 / 1264 Last » Next »