Sciweavers

10909 search results - page 2015 / 2182
» Evaluating Backup Algorithms
Sort
View
WWW
2002
ACM
16 years 5 months ago
A machine learning based approach for table detection on the web
Table is a commonly used presentation scheme, especially for describing relational information. However, table understanding remains an open problem. In this paper, we consider th...
Yalin Wang, Jianying Hu
RECOMB
2009
Springer
16 years 5 months ago
Learning Models for Aligning Protein Sequences with Predicted Secondary Structure
Accurately aligning distant protein sequences is notoriously difficult. A recent approach to improving alignment accuracy is to use additional information such as predicted seconda...
Eagu Kim, Travis J. Wheeler, John D. Kececioglu
CCS
2009
ACM
16 years 5 months ago
Automatic discovery of botnet communities on large-scale communication networks
Botnets are networks of compromised computers infected with malicious code that can be controlled remotely under a common command and control (C&C) channel. Recognized as one ...
Wei Lu, Mahbod Tavallaee, Ali A. Ghorbani
CHI
2009
ACM
16 years 5 months ago
Dancing with myself: the interactive visual canon platform
The canon is a composition pattern with a long history and many forms. The concept of the canon has also been applied to experimental film making and on Japanese television. We de...
Christoph Bartneck, Martijn ten Bhömer, Mathi...
HPCA
2009
IEEE
16 years 5 months ago
Blueshift: Designing processors for timing speculation from the ground up
Several recent processor designs have proposed to enhance performance by increasing the clock frequency to the point where timing faults occur, and by adding error-correcting supp...
Brian Greskamp, Lu Wan, Ulya R. Karpuzcu, Jeffrey ...
« Prev « First page 2015 / 2182 Last » Next »