Sciweavers

15840 search results - page 3168 / 3168
» The Control of Synchronous Systems
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
13 years 9 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
AAAI
2008
13 years 7 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
BMCBI
2006
156views more  BMCBI 2006»
13 years 5 months ago
Bayesian models for pooling microarray studies with multiple sources of replications
Background: Biologists often conduct multiple but different cDNA microarray studies that all target the same biological system or pathway. Within each study, replicate slides with...
Erin M. Conlon, Joon J. Song, Jun S. Liu
ADCM
1998
132views more  ADCM 1998»
13 years 5 months ago
Numerical solution of generalized Lyapunov equations
Two e cient methods for solving generalized Lyapunov equations and their implementations in FORTRAN 77 are presented. The rst one is a generalization of the Bartels{Stewart method...
Thilo Penzl
ADT
2011
12 years 9 months ago
Virtual networks: isolation, performance, and trends
Currently, there is a strong effort of the research community in rethinking the Internet architecture to cope with its current limitations and support new requirements. Many resea...
Natalia Castro Fernandes, Marcelo D. D. Moreira, I...
« Prev « First page 3168 / 3168 Last » Next »