Sciweavers

2421 search results - page 343 / 485
» Integrity Assurance Technique Using Determinant Approach
Sort
View
ESORICS
2005
Springer
15 years 10 months ago
On Scalability and Modularisation in the Modelling of Network Security Systems
Abstract. As the use of computers and data communication technologies spreads, network security systems are becoming increasingly complex, due to the incorporation of a variety of ...
João Porto de Albuquerque, Heiko Krumm, Pau...
135
Voted
ICCAD
2000
IEEE
88views Hardware» more  ICCAD 2000»
15 years 9 months ago
DRAGON2000: Standard-Cell Placement Tool for Large Industry Circuits
In this paper, we develop a new standard cell placement tool, Dragon2000, to solve large scale placement problem effectively. A top-down hierarchical approach is used in Dragon200...
Maogang Wang, Xiaojian Yang, Majid Sarrafzadeh
PRL
2008
181views more  PRL 2008»
15 years 4 months ago
Extractive spoken document summarization for information retrieval
The purpose of extractive summarization is to automatically select a number of indicative sentences, passages, or paragraphs from the original document according to a target summa...
Berlin Chen, Yi-Ting Chen
154
Voted
JBI
2007
138views Bioinformatics» more  JBI 2007»
15 years 4 months ago
Towards knowledge-based gene expression data mining
ct 10 The field of gene expression data analysis has grown in the past few years from being purely data-centric to integrative, aiming at 11 complementing microarray analysis with...
Riccardo Bellazzi, Blaz Zupan
ICUMT
2009
15 years 2 months ago
Coping with variability of location sensing in large-scale ubicomp environments
The work addresses the problem of coping with a diversity of location tracking techniques available in ubiquitous computing environments. We investigate how this diversity can be e...
Petr Aksenov, Kris Luyten, Karin Coninx