Sciweavers

5962 search results - page 863 / 1193
» Working with Patterns and Code
Sort
View
134
Voted
EVOW
2004
Springer
15 years 8 months ago
Evolving Regular Expression-Based Sequence Classifiers for Protein Nuclear Localisation
A number of bioinformatics tools use regular expression (RE) matching to locate protein or DNA sequence motifs that have been discovered by researchers in the laboratory. For exam...
Amine Heddad, Markus Brameier, Robert M. MacCallum
CSWWS
2006
15 years 8 months ago
Fulfilling the Needs of a Metadata Creator and Analyst- An Investigation of RDF Browsing and Visualization Tools
The realization of Semantic Web vision is based on the creation and use of semantic web content which needs software tools both for semantic web developers and end users. Over the ...
Shah Kushro, A. Min Tjoa
CTRSA
2006
Springer
146views Cryptology» more  CTRSA 2006»
15 years 8 months ago
Cache Attacks and Countermeasures: The Case of AES
We describe several software side-channel attacks based on inter-process leakage through the state of the CPU's memory cache. This leakage reveals memory access patterns, whic...
Dag Arne Osvik, Adi Shamir, Eran Tromer
135
Voted
DAWAK
2006
Springer
15 years 8 months ago
Efficient Mining of Dissociation Rules
Abstract. Association rule mining is one of the most popular data mining techniques. Significant work has been done to extend the basic association rule framework to allow for mini...
Mikolaj Morzy
ECOOP
2006
Springer
15 years 8 months ago
Automatic Prefetching by Traversal Profiling in Object Persistence Architectures
Object persistence architectures support transparent access to persistent objects. For efficiency, many of these architectures support queries that can prefetch associated objects ...
Ali Ibrahim, William R. Cook