Sciweavers

1522 search results - page 276 / 305
» Supporting Dynamic Process Specifications Using Communicatio...
Sort
View
EUROSYS
2008
ACM
15 years 6 months ago
Eudaemon: involuntary and on-demand emulation against zero-day exploits
Eudaemon is a technique that aims to blur the borders between protected and unprotected applications, and brings together honeypot technology and end-user intrusion detection and ...
Georgios Portokalidis, Herbert Bos
ISMB
1994
14 years 11 months ago
High Speed Pattern Matching in Genetic Data Base with Reconfigurable Hardware
Homologydetection in large data bases is probably the most time consuming operation in molecular genetic computing systems. Moreover, the progresses made all around the world conc...
Eric Lemoine, Joël Quinqueton, Jean Sallantin
EKAW
2004
Springer
15 years 3 months ago
ConEditor: Tool to Input and Maintain Constraints
We present a tool which helps domain experts capture and maintain constraints. The tool displays parts of an ontology (as classes, sub-classes and properties) in the form of a tree...
Suraj Ajit, Derek H. Sleeman, David W. Fowler, Dav...
SIGUCCS
2003
ACM
15 years 3 months ago
How to recruit, motivate and retain effective student workers?
Louisiana State University’s Biomedical Research Center is on a tight state funded budget, as are most state educational institutions. Resources are constantly being exhausted a...
Claire C. Lassalle, Robyn C. Richard
KDD
2007
ACM
182views Data Mining» more  KDD 2007»
15 years 10 months ago
Cleaning disguised missing data: a heuristic approach
In some applications such as filling in a customer information form on the web, some missing values may not be explicitly represented as such, but instead appear as potentially va...
Ming Hua, Jian Pei