Sciweavers

4397 search results - page 670 / 880
» Relational Algebra Operations
Sort
View
146
Voted
IWCMC
2006
ACM
15 years 9 months ago
System approach to intrusion detection using hidden Markov model
In an era of cooperating ad hoc networks and pervasive wireless connectivity, we are becoming more vulnerable to malicious attacks. Many of these attacks are silent in nature and ...
Rahul Khanna, Huaping Liu
MOBIDE
2006
ACM
15 years 9 months ago
Boosting location-based services with a moving object database engine
Composition of temporal and spatial properties of real world objects in a unified data framework results into Moving Object Databases (MOD). MODs are able to process, manage and a...
Nikos Pelekis, Yannis Theodoridis
147
Voted
SIGCSE
2006
ACM
183views Education» more  SIGCSE 2006»
15 years 9 months ago
Programming fundamentals and innovation taught through windows media player skin creation
Windows Media Player user interface “skin” creation has proven an extremely effective method to reinforce practical object oriented programming techniques. Skin creation motiv...
Todd Shurn
CSB
2005
IEEE
149views Bioinformatics» more  CSB 2005»
15 years 9 months ago
Combinatorial method of splice sites prediction
Predicting and proper ranking of splice sites (SS) is a challenging problem in bioinformatics and machine learning communities. Proposed method of donor and acceptor SSs predictio...
Alexander G. Churbanov, Hesham H. Ali
138
Voted
DATE
2005
IEEE
171views Hardware» more  DATE 2005»
15 years 9 months ago
Access Pattern-Based Code Compression for Memory-Constrained Embedded Systems
As compared to a large spectrum of performance optimizations, relatively little effort has been dedicated to optimize other aspects of embedded applications such as memory space r...
Ozcan Ozturk, Hendra Saputra, Mahmut T. Kandemir, ...