Sciweavers

712 search results - page 142 / 143
» The computer as software component: A mechanism for developi...
Sort
View
ASPLOS
2006
ACM
13 years 9 months ago
Comprehensively and efficiently protecting the heap
The goal of this paper is to propose a scheme that provides comprehensive security protection for the heap. Heap vulnerabilities are increasingly being exploited for attacks on co...
Mazen Kharbutli, Xiaowei Jiang, Yan Solihin, Guru ...
ATAL
2008
Springer
13 years 7 months ago
An interactive platform for auction-based allocation of loads in transportation logistics
This paper describes an agent-based platform for the allocation of loads in distributed transportation logistics, developed as a collaboration between CWI, Dutch National Center f...
Valentin Robu, Han Noot, Han La Poutré, Wil...
BMCBI
2005
152views more  BMCBI 2005»
13 years 5 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
GLVLSI
2003
IEEE
130views VLSI» more  GLVLSI 2003»
13 years 11 months ago
Zero overhead watermarking technique for FPGA designs
FPGAs, because of their re-programmability, are becoming very popular for creating and exchanging VLSI intellectual properties (IPs) in the reuse-based design paradigm. Existing w...
Adarsh K. Jain, Lin Yuan, Pushkin R. Pari, Gang Qu
WOTUG
2008
13 years 7 months ago
Representation and Implementation of CSP and VCR Traces
Abstract. Communicating Sequential Processes (CSP) was developed around a formal algebra of processes and a semantics based on traces (and failures and divergences). A trace is a r...
Neil C. C. Brown, Marc L. Smith