Sciweavers

99 search results - page 18 / 20
» Automated Information Extraction from Empirical Software Eng...
Sort
View
CASES
2004
ACM
13 years 11 months ago
Hardware assisted control flow obfuscation for embedded processors
+ With more applications being deployed on embedded platforms, software protection becomes increasingly important. This problem is crucial on embedded systems like financial transa...
Xiaotong Zhuang, Tao Zhang, Hsien-Hsin S. Lee, San...
ISSTA
2010
ACM
13 years 8 months ago
Perturbing numerical calculations for statistical analysis of floating-point program (in)stability
Writing reliable software is difficult. It becomes even more difficult when writing scientific software involving floating-point numbers. Computers provide numbers with limite...
Enyi Tang, Earl T. Barr, Xuandong Li, Zhendong Su
BMCBI
2011
12 years 9 months ago
Smith-Waterman Peak Alignment for Comprehensive Two-dimensional Gas Chromatography Mass Spectrometry
Background: Comprehensive two-dimensional gas chromatography coupled with mass spectrometry (GC × GCMS) is a powerful technique which has gained increasing attention over the las...
Seongho Kim, Imhoi Koo, Aiqin Fang, Xiang Zhang
BMCBI
2005
100views more  BMCBI 2005»
13 years 5 months ago
EvDTree: structure-dependent substitution profiles based on decision tree classification of 3D environments
Background: Structure-dependent substitution matrices increase the accuracy of sequence alignments when the 3D structure of one sequence is known, and are successful e.g. in fold ...
Jean-Christophe Gelly, Laurent Chiche, Jér&...
CLEF
2009
Springer
13 years 3 months ago
Clustering for Text and Image-Based Photo Retrieval at CLEF 2009
For this year's Image CLEF Photo Retrieval task, we have prepared 5 submission runs to help us assess the effectiveness of 1) image content-based retrieval, and 2) textbased ...
Qian Zhu, Diana Inkpen