Sciweavers

2748 search results - page 231 / 550
» Generating Object-Z Specifications from Use Cases
Sort
View
LISA
2008
15 years 3 months ago
Fast Packet Classification for Snort by Native Compilation of Rules
Signature matching, which includes packet classification and content matching, is the most expensive operation of a signature-based network intrusion detection system (NIDS). In t...
Alok Tongaonkar, Sreenaath Vasudevan, R. Sekar
105
Voted
KDD
2008
ACM
104views Data Mining» more  KDD 2008»
16 years 1 months ago
Learning methods for lung tumor markerless gating in image-guided radiotherapy
In an idealized gated radiotherapy treatment, radiation is delivered only when the tumor is at the right position. For gated lung cancer radiotherapy, it is difficult to generate ...
Ying Cui, Jennifer G. Dy, Gregory C. Sharp, Brian ...
118
Voted
EACL
2009
ACL Anthology
14 years 10 months ago
Who is "You"? Combining Linguistic and Gaze Features to Resolve Second-Person References in Dialogue
We explore the problem of resolving the second person English pronoun you in multi-party dialogue, using a combination of linguistic and visual features. First, we distinguish gen...
Matthew Frampton, Raquel Fernández, Patrick...
106
Voted
BMCBI
2008
136views more  BMCBI 2008»
15 years 29 days ago
An efficient method for the prediction of deleterious multiple-point mutations in the secondary structure of RNAs using suboptim
Background: RNAmute is an interactive Java application which, given an RNA sequence, calculates the secondary structure of all single point mutations and organizes them into categ...
Alexander Churkin, Danny Barash
152
Voted
HASE
2002
IEEE
15 years 5 months ago
An Approach to Specify and Test Component-Based Dependable Software
Components (in-house or pre-fabricated) are increasingly being used to reduce the cost of software development. Given that these components may not have not been developed with de...
Arshad Jhumka, Martin Hiller, Neeraj Suri