Sciweavers

390 search results - page 61 / 78
» Performance Analysis of the Active Object Pattern in Middlew...
Sort
View
DSN
2003
IEEE
15 years 5 months ago
A Data-Driven Finite State Machine Model for Analyzing Security Vulnerabilities
This paper combines an analysis of data on security vulnerabilities (published in Bugtraq database) and a focused source-code examination to develop a finite state machine (FSM) m...
Shuo Chen, Zbigniew Kalbarczyk, Jun Xu, Ravishanka...
HVEI
2009
14 years 9 months ago
Ecological optics of natural materials and light fields
The appearance of objects in scenes is determined by their shape, material properties and by the light field, and, in contradistinction, the appearance of those objects provides u...
Sylvia C. Pont
WWW
2009
ACM
15 years 4 months ago
Extracting data records from the web using tag path clustering
Fully automatic methods that extract lists of objects from the Web have been studied extensively. Record extraction, the first step of this object extraction process, identifies...
Gengxin Miao, Jun'ichi Tatemura, Wang-Pin Hsiung, ...
BMCBI
2008
106views more  BMCBI 2008»
14 years 11 months ago
Comparison of normalisation methods for surface-enhanced laser desorption and ionisation (SELDI) time-of-flight (TOF) mass spect
Background: Mass spectrometry for biological data analysis is an active field of research, providing an efficient way of high-throughput proteome screening. A popular variant of m...
Wouter Meuleman, Judith Y. M. N. Engwegen, Marie-C...
EICS
2009
ACM
15 years 3 months ago
A formal approach supporting the comparative predictive assessment of the interruption-tolerance of interactive systems
This paper presents an approach for investigating in a predictive way potential disruptive effects of interruptions on task performance in a multitasking environment. The approach...
Philippe A. Palanque, Marco Winckler, Jean-Fran&cc...