Sciweavers

14331 search results - page 2865 / 2867
» On the modeling and analysis of obligations
Sort
View
CCS
2011
ACM
13 years 9 months ago
Eliminating the hypervisor attack surface for a more secure cloud
Cloud computing is quickly becoming the platform of choice for many web services. Virtualization is the key underlying technology enabling cloud providers to host services for a l...
Jakub Szefer, Eric Keller, Ruby B. Lee, Jennifer R...
CIKM
2011
Springer
13 years 9 months ago
A probabilistic method for inferring preferences from clicks
Evaluating rankers using implicit feedback, such as clicks on documents in a result list, is an increasingly popular alternative to traditional evaluation methods based on explici...
Katja Hofmann, Shimon Whiteson, Maarten de Rijke
COCOA
2011
Springer
13 years 9 months ago
Algorithmic Aspects of Heterogeneous Biological Networks Comparison
Biological networks are commonly used to model molecular activity within the cell. Recent experimental studies have shown that the detection of conserved subnetworks across several...
Guillaume Blin, Guillaume Fertin, Hafedh Mohamed-B...
88
Voted
EMSOFT
2011
Springer
13 years 9 months ago
Software certification: coding, code, and coders
We describe a certification approach for software development that has been adopted at our organization. JPL develops robotic spacecraft for the exploration of the solar system. T...
Klaus Havelund, Gerard J. Holzmann
BIBE
2007
IEEE
191views Bioinformatics» more  BIBE 2007»
15 years 3 months ago
PANP - a New Method of Gene Detection on Oligonucleotide Expression Arrays
Abstract. Currently, the method most used for gene detection calls on Affymetrix oligonucleotide arrays is provided as part of the MAS5.0 software. The MAS method uses Wilcoxon sta...
Peter Warren, Deanne Taylor, Paolo G. V. Martini, ...
« Prev « First page 2865 / 2867 Last » Next »