Sciweavers

405 search results - page 81 / 81
» Using critical sets to solve the maximum independent set pro...
Sort
View
TC
1998
13 years 4 months ago
Algorithms for Variable Length Subnet Address Assignment
In a computer network that consists of M subnetworks, the L-bit address of a machine consists of two parts: A pre x si that contains the address of the subnetwork to which the mac...
Mikhail J. Atallah, Douglas Comer
AAAI
2004
13 years 6 months ago
SCoT: A Spoken Conversational Tutor
We describe SCoT, a Spoken Conversational Tutor, which has been implemented in order to investigate the advantages of natural language in tutoring, especially spoken language. SCo...
Karl Schultz, Brady Clark, Heather Pon-Barry, Eliz...
CASES
2004
ACM
13 years 10 months ago
Balancing design options with Sherpa
Application specific processors offer the potential of rapidly designed logic specifically constructed to meet the performance and area demands of the task at hand. Recently, t...
Timothy Sherwood, Mark Oskin, Brad Calder
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
13 years 11 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
BMCBI
2006
130views more  BMCBI 2006»
13 years 5 months ago
4SALE - A tool for synchronous RNA sequence and secondary structure alignment and editing
Background: In sequence analysis the multiple alignment builds the fundament of all proceeding analyses. Errors in an alignment could strongly influence all succeeding analyses an...
Philipp N. Seibel, Tobias Müller, Thomas Dand...