Sciweavers

244 search results - page 42 / 49
» From HTML documents to web tables and rules
Sort
View
POPL
2007
ACM
16 years 2 days ago
JavaScript instrumentation for browser security
It is well recognized that JavaScript can be exploited to launch browser-based security attacks. We propose to battle such attacks using program instrumentation. Untrusted JavaScr...
Dachuan Yu, Ajay Chander, Nayeem Islam, Igor Serik...
NAR
2011
190views Computer Vision» more  NAR 2011»
14 years 2 months ago
New tools and methods for direct programmatic access to the dbSNP relational database
Genome-wide association studies often incorporate information from public biological databases in order to provide a biological reference for interpreting the results. The dbSNP d...
Scott F. Saccone, Jiaxi Quan, Gaurang Mehta, Rapha...
157
Voted
ICDE
2012
IEEE
269views Database» more  ICDE 2012»
13 years 2 months ago
A Deep Embedding of Queries into Ruby
—We demonstrate SWITCH, a deep embedding of relational queries into RUBY and RUBY on RAILS. With SWITCH, there is no syntactic or stylistic difference between RUBY programs that ...
Torsten Grust, Manuel Mayr
SOCO
2002
Springer
14 years 11 months ago
Granular neural web agents for stock prediction
A granular neural Web-based stock prediction agent is developed using the granular neural network (GNN) that can discover fuzzy rules. Stock data sets are downloaded from www.yahoo...
Yan-Qing Zhang, Somasheker Akkaladevi, George J. V...
ISI
2006
Springer
14 years 11 months ago
An Embedded Bayesian Network Hidden Markov Model for Digital Forensics
In the paper we combine a Bayesian Network model for encoding forensic evidence during a given time interval with a Hidden Markov Model (EBN-HMM) for tracking and predicting the de...
Olivier Y. de Vel, Nianjun Liu, Terry Caelli, Tib&...