Sciweavers

160 search results - page 32 / 32
» Extracting Behavior Specification of Components in Legacy Ap...
Sort
View
NAR
2006
87views more  NAR 2006»
13 years 5 months ago
From genomics to chemical genomics: new developments in KEGG
The increasing amount of genomic and molecular information is the basis for understanding higherorder biological systems, such as the cell and the 15 organism, and their interacti...
Minoru Kanehisa, Susumu Goto, Masahiro Hattori, Ki...
ACSAC
2010
IEEE
13 years 3 months ago
Cujo: efficient detection and prevention of drive-by-download attacks
The JavaScript language is a core component of active and dynamic web content in the Internet today. Besides its great success in enhancing web applications, however, JavaScript p...
Konrad Rieck, Tammo Krueger, Andreas Dewald
HPCA
2008
IEEE
14 years 5 months ago
Automated microprocessor stressmark generation
Estimating the maximum power and thermal characteristics of a processor is essential for designing its power delivery system, packaging, cooling, and power/thermal management sche...
Ajay M. Joshi, Lieven Eeckhout, Lizy Kurian John, ...
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
13 years 12 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
SIGECOM
2008
ACM
138views ECommerce» more  SIGECOM 2008»
13 years 5 months ago
Generalized scoring rules and the frequency of coalitional manipulability
We introduce a class of voting rules called generalized scoring rules. Under such a rule, each vote generates a vector of k scores, and the outcome of the voting rule is based onl...
Lirong Xia, Vincent Conitzer