Sciweavers

7821 search results - page 1443 / 1565
» Nested Ordered Sets and their Use for Data Modelling
Sort
View
99
Voted
ELPUB
1998
ACM
15 years 5 months ago
The Library in the Card: Results from Decomate Project and Current Developments at UAB
The Library in the card is the slogan which would summarize the aims of the Univeritat Autonoma de Barcelona (UAB) Library Service in its involvement in several EC Libraries Progr...
Nuria Gallart
PODS
1995
ACM
139views Database» more  PODS 1995»
15 years 4 months ago
Normalizing Incomplete Databases
Databases are often incomplete because of the presence of disjunctive information, due to con icts, partial knowledge and other reasons. Queries against such databases often ask q...
Leonid Libkin
DIMVA
2010
15 years 2 months ago
HookScout: Proactive Binary-Centric Hook Detection
Abstract. In order to obtain and maintain control, kernel malware usually makes persistent control flow modifications (i.e., installing hooks). To avoid detection, malware develope...
Heng Yin, Pongsin Poosankam, Steve Hanna, Dawn Xia...
SDM
2004
SIAM
207views Data Mining» more  SDM 2004»
15 years 2 months ago
BAMBOO: Accelerating Closed Itemset Mining by Deeply Pushing the Length-Decreasing Support Constraint
Previous study has shown that mining frequent patterns with length-decreasing support constraint is very helpful in removing some uninteresting patterns based on the observation t...
Jianyong Wang, George Karypis
BMCBI
2010
156views more  BMCBI 2010»
15 years 25 days ago
PeakAnalyzer: Genome-wide annotation of chromatin binding and modification loci
Background: Functional genomic studies involving high-throughput sequencing and tiling array applications, such as ChIP-seq and ChIP-chip, generate large numbers of experimentally...
Mali Salmon-Divon, Heidi Dvinge, Kairi Tammoja, Pa...
« Prev « First page 1443 / 1565 Last » Next »