Sciweavers

2004 search results - page 227 / 401
» Understanding Ontological Levels
Sort
View
DSN
2008
IEEE
15 years 6 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
HCI
2007
15 years 6 months ago
An Adaptive Vision System Toward Implicit Human Computer Interaction
In implicit human computer interaction, computers are required to understand users’ actions and intentions so as to provide proactive services. Visual processing has to detect an...
Peng Dai, Linmi Tao, Xiang Zhang, Ligeng Dong, Gua...
APBC
2004
121views Bioinformatics» more  APBC 2004»
15 years 6 months ago
Using Emerging Pattern Based Projected Clustering and Gene Expression Data for Cancer Detection
Using gene expression data for cancer detection is one of the famous research topics in bioinformatics. Theoretically, gene expression data is capable to detect all types of early...
Larry T. H. Yu, Fu-Lai Chung, Stephen Chi-fai Chan...
AVI
2004
15 years 6 months ago
How users interact with biodiversity information using TaxonTree
Biodiversity databases have recently become widely available to the public and to other researchers. To retrieve information from these resources, users must understand the underl...
Bongshin Lee, Cynthia Sims Parr, Dana Campbell, Be...
APVIS
2006
15 years 6 months ago
Predicting graph reading performance: a cognitive approach
Performance and preference measures are commonly used in the assessment of visualization techniques. This is important and useful in understanding differences in effectiveness bet...
Weidong Huang, Seok-Hee Hong, Peter Eades