Sciweavers

1494 search results - page 291 / 299
» Less Extreme Programming
Sort
View
IICAI
2003
15 years 1 months ago
Machine Learning in Infrastructure Security
Abstract: Democratic societies throughout the world, it appears, are facing a new type of threat dubbed "asymmetric threat." In this new threat environment the world gove...
V. Rao Vemuri
116
Voted
USS
2004
15 years 1 months ago
Avfs: An On-Access Anti-Virus File System
Viruses and other malicious programs are an everincreasing threat to current computer systems. They can cause serious damage and consume countless hours of system administrators&#...
Yevgeniy Miretskiy, Abhijith Das, Charles P. Wrigh...
WSC
1997
15 years 1 months ago
Integrating Distributed Simulation Objects
Creating comprehensive simulation models can be expensive and time consuming. This paper discusses our efforts to develop a general methodology that will allow users to quickly an...
Joseph A. Heim
ACL
1996
15 years 1 months ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes
BMCBI
2010
120views more  BMCBI 2010»
14 years 11 months ago
Short clones or long clones? A simulation study on the use of paired reads in metagenomics
Background: Metagenomics is the study of environmental samples using sequencing. Rapid advances in sequencing technology are fueling a vast increase in the number and scope of met...
Suparna Mitra, Max Schubach, Daniel H. Huson