Sciweavers

3555 search results - page 151 / 711
» Security-Critical System Development with Extended Use Cases
Sort
View
138
Voted
ISSTA
2006
ACM
15 years 9 months ago
The case for analysis preserving language transformation
Static analysis has gained much attention over the past few years in applications such as bug finding and program verification. As software becomes more complex and componentize...
Xiaolan Zhang, Larry Koved, Marco Pistoia, Sam Web...
138
Voted
BMCBI
2008
106views more  BMCBI 2008»
15 years 3 months ago
Ontology Design Patterns for bio-ontologies: a case study on the Cell Cycle Ontology
Background: Bio-ontologies are key elements of knowledge management in bioinformatics. Rich and rigorous bio-ontologies should represent biological knowledge with high fidelity an...
Mikel Egaña Aranguren, Erick Antezana, Mart...
ACL
2008
15 years 5 months ago
Icelandic Data Driven Part of Speech Tagging
Data driven POS tagging has achieved good performance for English, but can still lag behind linguistic rule based taggers for morphologically complex languages, such as Icelandic....
Mark Dredze, Joel Wallenberg
TIFS
2008
102views more  TIFS 2008»
15 years 3 months ago
Use of Identification Trial Statistics for the Combination of Biometric Matchers
Combination functions typically used in biometric identification systems consider as input parameters only those matching scores which are related to a single person in order to de...
Sergey Tulyakov, Venu Govindaraju
ICDE
2010
IEEE
183views Database» more  ICDE 2010»
15 years 10 months ago
Estimating the compression fraction of an index using sampling
—Data compression techniques such as null suppression and dictionary compression are commonly used in today’s database systems. In order to effectively leverage compression, it...
Stratos Idreos, Raghav Kaushik, Vivek R. Narasayya...