Sciweavers

390 search results - page 77 / 78
» Virtual Attribute Subsetting
Sort
View
ACSAC
2005
IEEE
13 years 11 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
INFOCOM
1993
IEEE
13 years 9 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
FPCA
1989
13 years 9 months ago
Theorems for Free!
Parametric polymorphism constrains the behavior of pure functional programs in a way that allows the derivation of interesting theorems about them solely from their types, i.e., v...
Philip Wadler
BMCBI
2007
104views more  BMCBI 2007»
13 years 5 months ago
Predicting active site residue annotations in the Pfam database
Background: Approximately 5% of Pfam families are enzymatic, but only a small fraction of the sequences within these families (<0.5%) have had the residues responsible for cata...
Jaina Mistry, Alex Bateman, Robert D. Finn
JMLR
2006
96views more  JMLR 2006»
13 years 5 months ago
A Hierarchy of Support Vector Machines for Pattern Detection
We introduce a computational design for pattern detection based on a tree-structured network of support vector machines (SVMs). An SVM is associated with each cell in a recursive ...
Hichem Sahbi, Donald Geman