Sciweavers

22 search results - page 4 / 5
» Control and Data Flow Testing on Function Block Diagrams
Sort
View
ICISS
2010
Springer
13 years 3 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
TON
2012
11 years 7 months ago
A Transport Protocol to Exploit Multipath Diversity in Wireless Networks
Abstract—Wireless networks (including wireless mesh networks) provide opportunities for using multiple paths. Multihoming of hosts, possibly using different technologies and prov...
Vicky Sharma, Koushik Kar, K. K. Ramakrishnan, Shi...
ICML
2008
IEEE
14 years 6 months ago
On the quantitative analysis of deep belief networks
Deep Belief Networks (DBN's) are generative models that contain many layers of hidden variables. Efficient greedy algorithms for learning and approximate inference have allow...
Ruslan Salakhutdinov, Iain Murray
SIGSOFT
2007
ACM
14 years 6 months ago
Programming asynchronous layers with CLARITY
Asynchronous systems components are hard to write, hard to reason about, and (not coincidentally) hard to mechanically verify. In order to achieve high performance, asynchronous c...
Prakash Chandrasekaran, Christopher L. Conway, Jos...
BMCBI
2010
161views more  BMCBI 2010»
13 years 5 months ago
GeneMesh: a web-based microarray analysis tool for relating differentially expressed genes to MeSH terms
Background: An important objective of DNA microarray-based gene expression experimentation is determining interrelationships that exist between differentially expressed genes and ...
Saurin D. Jani, Gary L. Argraves, Jeremy L. Barth,...