Sciweavers

548 search results - page 73 / 110
» The Relational Data Model, Normalisation and effective Datab...
Sort
View
CIKM
2008
Springer
15 years 3 months ago
Exploiting context to detect sensitive information in call center conversations
Protecting sensitive information while preserving the shareability and usability of data is becoming increasingly important. In call-centers a lot of customer related sensitive in...
Tanveer A. Faruquie, Sumit Negi, Anup Chalamalla, ...
117
Voted
BMCBI
2005
246views more  BMCBI 2005»
15 years 1 months ago
ParPEST: a pipeline for EST data analysis based on parallel computing
Background: Expressed Sequence Tags (ESTs) are short and error-prone DNA sequences generated from the 5' and 3' ends of randomly selected cDNA clones. They provide an im...
Nunzio D'Agostino, Mario Aversano, Maria Luisa Chi...
TPDS
2002
126views more  TPDS 2002»
15 years 1 months ago
P-3PC: A Point-to-Point Communication Model for Automatic and Optimal Decomposition of Regular Domain Problems
One of the most fundamental problems automatic parallelization tools are confronted with is to find an optimal domain decomposition for a given application. For regular domain prob...
Frank J. Seinstra, Dennis Koelma
VMCAI
2005
Springer
15 years 7 months ago
Optimizing Bounded Model Checking for Linear Hybrid Systems
Bounded model checking (BMC) is an automatic verification method that is based on a finite unfolding of the system’s transition relation. BMC has been successfully applied, in ...
Erika Ábrahám, Bernd Becker, Felix K...
HICSS
2003
IEEE
119views Biometrics» more  HICSS 2003»
15 years 7 months ago
Modeling and Analyzing Communications Infrastructure A Case Study of an International Organization
EnCompass®1 , a web-enabled system for organizational process visualization, analysis, synthesis, and management, provides an interactive vehicle for understanding the influence ...
Michael M. Mann, Ericka Hansen Bryant