Sciweavers

4698 search results - page 260 / 940
» Making Functionality More General
Sort
View
RECOMB
2008
Springer
16 years 4 months ago
A Fast, Alignment-Free, Conservation-Based Method for Transcription Factor Binding Site Discovery
As an increasing number of eukaryotic genomes are being sequenced, comparative studies aimed at detecting regulatory elements in intergenic sequences are becoming more prevalent. M...
Raluca Gordân, Leelavati Narlikar, Alexander...
172
Voted
APSEC
2007
IEEE
15 years 8 months ago
Simultaneous Modification Support based on Code Clone Analysis
Maintaining software systems becomes more difficult as their size and complexity increase. One factor that makes software maintenance more difficult is the presence of code clones...
Yoshiki Higo, Yasushi Ueda, Shinji Kusumoto, Katsu...
130
Voted
ASIAN
2007
Springer
129views Algorithms» more  ASIAN 2007»
15 years 8 months ago
An Integrated Model for Access Control and Information Flow Requirements
Current information systems are more and more complex. They require more interactions between different components and users. So, ensuring system security must not be limited to us...
Samiha Ayed, Nora Cuppens-Boulahia, Fréd&ea...
126
Voted
NIPS
2008
15 years 5 months ago
Optimal Response Initiation: Why Recent Experience Matters
In most cognitive and motor tasks, speed-accuracy tradeoffs are observed: Individuals can respond slowly and accurately, or quickly yet be prone to errors. Control mechanisms gove...
Matt Jones, Michael C. Mozer, Sachiko Kinoshita
IWFM
2003
15 years 5 months ago
Using Admissible Interference to Detect Denial of Service Vulnerabilities
Meadows recently proposed a formal cost-based framework for analysis of denial of service. It was showed how some principles that have already been used to make cryptographic prot...
Stéphane Lafrance, John Mullins