Sciweavers

5799 search results - page 1114 / 1160
» Health-OS: : a position paper
Sort
View
CCS
2009
ACM
15 years 8 months ago
A new cell counter based attack against tor
Various low-latency anonymous communication systems such as Tor and Anoymizer have been designed to provide anonymity service for users. In order to hide the communication of user...
Zhen Ling, Junzhou Luo, Wei Yu, Xinwen Fu, Dong Xu...
EDBT
2009
ACM
120views Database» more  EDBT 2009»
15 years 8 months ago
Retrieving meaningful relaxed tightest fragments for XML keyword search
Adapting keyword search to XML data has been attractive recently, generalized as XML keyword search (XKS). One of its key tasks is to return the meaningful fragments as the result...
Lingbo Kong, Rémi Gilleron, Aurélien...
KDD
2009
ACM
266views Data Mining» more  KDD 2009»
15 years 8 months ago
OpinionMiner: a novel machine learning system for web opinion mining and extraction
Merchants selling products on the Web often ask their customers to share their opinions and hands-on experiences on products they have purchased. Unfortunately, reading through al...
Wei Jin, Hung Hay Ho, Rohini K. Srihari
RECOMB
2009
Springer
15 years 8 months ago
Protein Fragment Swapping: A Method for Asymmetric, Selective Site-Directed Recombination
This paper presents a new approach to site-directed recombination, swapping combinations of selected discontiguous fragments from a source protein in place of corresponding fragmen...
Wei Zheng, Karl E. Griswold, Chris Bailey-Kellogg
CCECE
2009
IEEE
15 years 8 months ago
Estimation of boundary properties using stochastic differential equations
The inverse diffusion problems deal with the estimation of many crucial parameters such as the diffusion coefficient, source properties, and boundary conditions. Such algorithms ...
Ashraf Atalla, Aleksandar Jeremic
« Prev « First page 1114 / 1160 Last » Next »