Sciweavers

1937 search results - page 368 / 388
» Starting B Specifications from Use Cases
Sort
View
SIGMOD
2010
ACM
362views Database» more  SIGMOD 2010»
14 years 6 months ago
Data warehousing and analytics infrastructure at facebook
Scalable analysis on large data sets has been core to the functions of a number of teams at Facebook - both engineering and nonengineering. Apart from ad hoc analysis of data and ...
Ashish Thusoo, Zheng Shao, Suresh Anthony, Dhruba ...
94
Voted
BMCBI
2007
131views more  BMCBI 2007»
14 years 11 months ago
ISHAPE: new rapid and accurate software for haplotyping
Background: We have developed a new haplotyping program based on the combination of an iterative multiallelic EM algorithm (IEM), bootstrap resampling and a pseudo Gibbs sampler. ...
Olivier Delaneau, Cédric Coulonges, Pierre-...
ICDE
2008
IEEE
114views Database» more  ICDE 2008»
16 years 1 months ago
On Unifying Privacy and Uncertain Data Models
The problem of privacy-preserving data mining has been studied extensively in recent years because of the increased amount of personal information which is available to corporation...
Charu C. Aggarwal
CEAS
2005
Springer
15 years 5 months ago
Searching For John Doe: Finding Spammers and Phishers
Microsoft has prosecuted a vigorous civil enforcement campaign against spammers and phishers. When initial investigation into a spam or phishing case fails to reveal the identity ...
Aaron E. Kornblum
HYBRID
1998
Springer
15 years 4 months ago
Formal Verification of Safety-Critical Hybrid Systems
This paper investigates how formal techniques can be used for the analysis and verification of hybrid systems [1,5,7,16] -- systems involving both discrete and continuous behavior....
Carolos Livadas, Nancy A. Lynch