Sciweavers

1424 search results - page 209 / 285
» Experiences on Designing an Integral Intrusion Detection Sys...
Sort
View
CVPR
2008
IEEE
15 years 3 months ago
Demosaicking recognition with applications in digital photo authentication based on a quadratic pixel correlation model
Most digital still color cameras use a single electronic sensor (CCD or CMOS) overlaid with a color filter array. At each pixel location only one color sample is taken, and the ot...
Yizhen Huang, Yangjing Long
BIOINFORMATICS
2002
146views more  BIOINFORMATICS 2002»
15 years 1 months ago
A duplication growth model of gene expression networks
Motivation: There has been considerable interest in developing computational techniques for inferring genetic regulatory networks from whole-genome expression profiles. When expre...
Ashish Bhan, David J. Galas, T. Gregory Dewey
PVLDB
2010
126views more  PVLDB 2010»
14 years 11 months ago
Set Similarity Join on Probabilistic Data
Set similarity join has played an important role in many real-world applications such as data cleaning, near duplication detection, data integration, and so on. In these applicati...
Xiang Lian, Lei Chen 0002
OOPSLA
2004
Springer
15 years 6 months ago
A practical type system and language for reference immutability
This paper describes a type system that is capable of expressing and enforcing immutability constraints. The specific constraint exis that the abstract state of the object to whi...
Adrian Birka, Michael D. Ernst
ESCIENCE
2007
IEEE
15 years 7 months ago
A SLA-Oriented Management of Containers for Hosting Stateful Web Services
Service-Oriented Architectures provide integration of interoperability for independent and loosely coupled services. Web services and the associated new standards such as WSRF are...
Christoph Reich, Kris Bubendorfer, Matthias Banhol...