Sciweavers

2015 search results - page 372 / 403
» Hidden Software Capabilities
Sort
View
95
Voted
KDD
2007
ACM
177views Data Mining» more  KDD 2007»
16 years 27 days ago
On-board analysis of uncalibrated data for a spacecraft at mars
Analyzing data on-board a spacecraft as it is collected enables several advanced spacecraft capabilities, such as prioritizing observations to make the best use of limited bandwid...
Benyang Tang, Kiri Wagstaff, Rebecca Castañ...
VLSID
2006
IEEE
142views VLSI» more  VLSID 2006»
16 years 26 days ago
Impact of Configurability and Extensibility on IPSec Protocol Execution on Embedded Processors
- Security protocols, such as IPSec and SSL, are being increasingly deployed in the context of networked embedded systems. The resource-constrained nature of embedded systems and, ...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
RECOMB
2008
Springer
16 years 24 days ago
BayCis: A Bayesian Hierarchical HMM for Cis-Regulatory Module Decoding in Metazoan Genomes
The transcriptional regulatory sequences in metazoan genomes often consist of multiple cis-regulatory modules (CRMs). Each CRM contains locally enriched occurrences of binding site...
Tien-ho Lin, Pradipta Ray, Geir Kjetil Sandve, Sel...
131
Voted
ICDE
2010
IEEE
251views Database» more  ICDE 2010»
16 years 7 days ago
Viewing a World of Annotations through AnnoVIP
The proliferation of electronic content has notably lead to the apparition of large corpora of interrelated structured documents (such as HTML and XML Web pages) and semantic annot...
Konstantinos Karanasos, Spyros Zoupanos
125
Voted
MOBISYS
2008
ACM
16 years 2 days ago
Flashproxy: transparently enabling rich web content via remote execution
It is now common for Web sites to use active Web content, such as Flash, Silverlight, or Java applets, to support rich, interactive applications. For many mobile devices, however,...
Alexander Moshchuk, Steven D. Gribble, Henry M. Le...