Sciweavers

945 search results - page 180 / 189
» Detective Information Flow Analysis for Business Processes
Sort
View
112
Voted
CCS
2007
ACM
15 years 8 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
125
Voted
BMCBI
2010
95views more  BMCBI 2010»
15 years 1 months ago
Quantifying the relationship between sequence and three-dimensional structure conservation in RNA
Background: In recent years, the number of available RNA structures has rapidly grown reflecting the increased interest on RNA biology. Similarly to the studies carried out two de...
Emidio Capriotti, Marc A. Martí-Renom
LBM
2007
15 years 3 months ago
Syntactic Features for Protein-Protein Interaction Extraction
Background: Extracting Protein-Protein Interactions (PPI) from research papers is a way of translating information from English to the language used by the databases that store th...
Rune Sætre, Kenji Sagae, Jun-ichi Tsujii
126
Voted
MM
2006
ACM
199views Multimedia» more  MM 2006»
15 years 7 months ago
Concept-based electronic health records: opportunities and challenges
Healthcare is a data-rich but information-poor domain. Terabytes of multimedia medical data are being generated on a monthly basis in a typical healthcare organization in order to...
Shahram Ebadollahi, Anni Coden, Michael A. Tanenbl...
120
Voted
CIKM
2008
Springer
15 years 3 months ago
A consensus based approach to constrained clustering of software requirements
Managing large-scale software projects involves a number of activities such as viewpoint extraction, feature detection, and requirements management, all of which require a human a...
Chuan Duan, Jane Cleland-Huang, Bamshad Mobasher