Sciweavers

114 search results - page 23 / 23
» Using Verification Technology to Specify and Detect Malware
Sort
View
DSN
2002
IEEE
13 years 9 months ago
Ditto Processor
Concentration of design effort for current single-chip Commercial-Off-The-Shelf (COTS) microprocessors has been directed towards performance. Reliability has not been the primary ...
Shih-Chang Lai, Shih-Lien Lu, Jih-Kwon Peir
WWW
2004
ACM
14 years 5 months ago
Mining models of human activities from the web
The ability to determine what day-to-day activity (such as cooking pasta, taking a pill, or watching a video) a person is performing is of interest in many application domains. A ...
Mike Perkowitz, Matthai Philipose, Kenneth P. Fish...
HVEI
2009
13 years 2 months ago
Crossmodal information for visual and haptic discrimination
Both our visual and haptic systems contribute to the perception of the three dimensional world, especially the proximal perception of objects. The interaction of these systems has...
Flip Phillips, Eric J. L. Egan
BMCBI
2010
154views more  BMCBI 2010»
13 years 4 months ago
Motif Enrichment Analysis: a unified framework and an evaluation on ChIP data
Background: A major goal of molecular biology is determining the mechanisms that control the transcription of genes. Motif Enrichment Analysis (MEA) seeks to determine which DNA-b...
Robert C. McLeay, Timothy L. Bailey