Sciweavers

1294 search results - page 241 / 259
» Privacy and Data Mining: New Developments and Challenges
Sort
View
ICCV
1995
IEEE
15 years 3 months ago
Algorithms for Implicit Deformable Models
This paper presents a framework for implicit deformable models and a pair of new algorithms for solving the nonlinear partial di erential equations that result from this framework...
Ross T. Whitaker
DSN
2008
IEEE
15 years 1 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
FGCS
2008
159views more  FGCS 2008»
14 years 11 months ago
Access control management for ubiquitous computing
The purpose of ubiquitous computing is anywhere and anytime access to information within computing infrastructures that is blended into a background and no longer be reminded. Thi...
Hua Wang, Yanchun Zhang, Jinli Cao
DKE
2007
116views more  DKE 2007»
14 years 11 months ago
A concurrent rule scheduling algorithm for active rules
The use of rules in a distributed environment creates new challenges for the development of active rule execution models. In particular, since a single event can trigger multiple ...
Ying Jin, Susan Darling Urban, Suzanne W. Dietrich
BMCBI
2005
140views more  BMCBI 2005»
14 years 11 months ago
JACOP: A simple and robust method for the automated classification of protein sequences with modular architecture
Background: Whole-genome sequencing projects are rapidly producing an enormous number of new sequences. Consequently almost every family of proteins now contains hundreds of membe...
Peter Sperisen, Marco Pagni