Sciweavers

22128 search results - page 4341 / 4426
» Research in Structural Computing
Sort
View
124
Voted
P2P
2007
IEEE
153views Communications» more  P2P 2007»
15 years 9 months ago
On Routing in Distributed Hash Tables
There have been many proposals for constructing routing tables for Distributed Hash Tables (DHT). They can be classified into two groups: A) those that assume that the peers are ...
Fabius Klemm, Sarunas Girdzijauskas, Jean-Yves Le ...
138
Voted
TPHOL
2007
IEEE
15 years 9 months ago
Using XCAP to Certify Realistic Systems Code: Machine Context Management
Formal, modular, and mechanized verification of realistic systems code is desirable but challenging. Verification of machine context management (a basis of multi-tasking) is one ...
Zhaozhong Ni, Dachuan Yu, Zhong Shao
121
Voted
FUZZIEEE
2007
IEEE
15 years 9 months ago
Mining and Predicting CpG islands
— A DNA sequence can be described as a string composed of four symbols: A, T, C and G. Each symbol represents a chemically distinct nucleotide molecule. Combinations of two nucle...
Christopher Previti, Oscar Harari, Coral del Val
151
Voted
AIRWEB
2007
Springer
15 years 9 months ago
Splog Detection Using Self-similarity Analysis on Blog Temporal Dynamics
This paper focuses on spam blog (splog) detection. Blogs are highly popular, new media social communication mechanisms. The presence of splogs degrades blog search results as well...
Yu-Ru Lin, Hari Sundaram, Yun Chi, Jun'ichi Tatemu...
121
Voted
AMR
2007
Springer
167views Multimedia» more  AMR 2007»
15 years 9 months ago
Ontology: Use and Abuse
This paper is a critical analysis of the use of ontology as an instrument to specify the semantics of a document. The paper argue that not only is a logic of the type used in ontol...
Simone Santini
« Prev « First page 4341 / 4426 Last » Next »