Sciweavers

1722 search results - page 284 / 345
» Dedication
Sort
View
85
Voted
CIKM
2007
Springer
15 years 6 months ago
Using word similarity to eradicate junk emails
Emails are one of the most commonly used modern communication media these days; however, unsolicited emails obstruct this otherwise fast and convenient technology for information ...
Maria Soledad Pera, Yiu-Kai Ng
102
Voted
DFG
2007
Springer
15 years 6 months ago
PointCloudXplore 2: Visual Exploration of 3D Gene Expression
: To better understand how developmental regulatory networks are defined in the genome sequence, the Berkeley Drosophila Transcription Network Project (BDNTP) has developed a suit...
Oliver Rübel, Gunther H. Weber, Min-Yu Huang,...
93
Voted
EMSOFT
2007
Springer
15 years 6 months ago
Buffer optimization and dispatching scheme for embedded systems with behavioral transparency
Software components are modular and can enable post-deployment update, but their high overhead in runtime and memory is prohibitive for many embedded systems. This paper proposes ...
Jiwon Hahn, Pai H. Chou
GRID
2007
Springer
15 years 6 months ago
CIC portal: a collaborative and scalable integration platform for high availability grid operations
— EGEE, along with its sister project LCG, manages the world’s largest Grid production infrastructure which is spreading nowadays over 260 sites in more than 40 countries. Just...
Osman Aidel, Alessandro Cavalli, Hélè...
95
Voted
PEPM
2007
ACM
15 years 6 months ago
Behavioral similarity matching using concrete source code templates in logic queries
Program query languages and pattern-detection techniques are an essential part of program analysis and manipulation systems. Queries and patterns permit the identification of the...
Coen De Roover, Theo D'Hondt, Johan Brichau, Carlo...