Sciweavers

610 search results - page 24 / 122
» Generating Research Websites Using Summarisation Techniques
Sort
View
90
Voted
CCS
2010
ACM
14 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
MOBIHOC
2003
ACM
15 years 9 months ago
SHORT: self-healing and optimizing routing techniques for mobile ad hoc networks
On demand routing protocols provide scalable and costeffective solutions for packet routing in mobile wireless ad hoc networks. The paths generated by these protocols may deviate ...
Chao Gui, Prasant Mohapatra
IV
2003
IEEE
99views Visualization» more  IV 2003»
15 years 2 months ago
Visual Representation of Database Queries using Structural Similarity
It is often useful to get high-level views of datasets in order to identify areas of interest worthy of further exploration. In relational databases, the high-level view can be de...
Dennis P. Groth
BMCBI
2010
125views more  BMCBI 2010»
14 years 9 months ago
In-silico prediction of blood-secretory human proteins using a ranking algorithm
Background: Computational identification of blood-secretory proteins, especially proteins with differentially expressed genes in diseased tissues, can provide highly useful inform...
Qi Liu, Juan Cui, Qiang Yang, Ying Xu
91
Voted
ICSE
2010
IEEE-ACM
15 years 2 months ago
Providing support for creating next generation software architecture languages
Many languages for software architectures have been proposed, each dealing with different stakeholder concerns, operating at different levels of abstraction and with different deg...
Ivano Malavolta