Sciweavers

330 search results - page 65 / 66
» Towards A Practical Approach to Test Aspect-Oriented Softwar...
Sort
View
BMCBI
2010
218views more  BMCBI 2010»
13 years 3 months ago
A hybrid blob-slice model for accurate and efficient detection of fluorescence labeled nuclei in 3D
Background: To exploit the flood of data from advances in high throughput imaging of optically sectioned nuclei, image analysis methods need to correctly detect thousands of nucle...
Anthony Santella, Zhuo Du, Sonja Nowotschin, Anna-...
CCS
2010
ACM
13 years 3 months ago
The limits of automatic OS fingerprint generation
Remote operating system fingerprinting relies on implementation differences between OSs to identify the specific variant executing on a remote host. Because these differences can ...
David W. Richardson, Steven D. Gribble, Tadayoshi ...
ASPLOS
2006
ACM
13 years 11 months ago
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
Log-based recovery and replay systems are important for system reliability, debugging and postmortem analysis/recovery of malware attacks. These systems must incur low space and p...
Daniela A. S. de Oliveira, Jedidiah R. Crandall, G...
AAAI
2006
13 years 7 months ago
LOCATE Intelligent Systems Demonstration: Adapting Help to the Cognitive Styles of Users
LOCATE is workspace layout design software that also serves as a testbed for developing and refining principles of adaptive aiding. This demonstration illustrates LOCATE's ab...
Jack L. Edwards, Greg Scott
SIGMOD
2011
ACM
170views Database» more  SIGMOD 2011»
12 years 8 months ago
Warding off the dangers of data corruption with amulet
Occasional corruption of stored data is an unfortunate byproduct of the complexity of modern systems. Hardware errors, software bugs, and mistakes by human administrators can corr...
Nedyalko Borisov, Shivnath Babu, NagaPramod Mandag...