Sciweavers

1548 search results - page 276 / 310
» Estimating Software Vulnerabilities
Sort
View
99
Voted
CORR
2006
Springer
160views Education» more  CORR 2006»
14 years 11 months ago
On Conditional Branches in Optimal Search Trees
A commonly used type of search tree is the alphabetic binary tree, which uses (without loss of generality) "less than" versus "greater than or equal to" tests ...
Michael B. Baer
ESWA
2006
148views more  ESWA 2006»
14 years 11 months ago
Applications of artificial intelligence in bioinformatics: A review
Artificial intelligence (AI) has increasingly gained attention in bioinformatics research and computational molecular biology. With the availability of different types of AI algor...
Zoheir Ezziane
IJHPCA
2008
75views more  IJHPCA 2008»
14 years 11 months ago
Towards Ultra-High Resolution Models of Climate and Weather
We present a speculative extrapolation of the performance aspects of an atmospheric general circulation model to ultra-high resolution and describe alternative technological paths...
Michael F. Wehner, Leonid Oliker, John Shalf
KAIS
2008
109views more  KAIS 2008»
14 years 11 months ago
Knowledge-empowered automated negotiation system for e-Commerce
This paper focuses on knowledge empowered automated negotiation systems for buyer-centric multi-bilateral multi-attribute e-Procurement. We propose two knowledge empowered models,...
Zhuang Yan, Simon Fong, Meilin Shi
73
Voted
SIGIR
2008
ACM
14 years 11 months ago
Evaluation over thousands of queries
Information retrieval evaluation has typically been performed over several dozen queries, each judged to near-completeness. There has been a great deal of recent work on evaluatio...
Ben Carterette, Virgiliu Pavlu, Evangelos Kanoulas...