Sciweavers

2826 search results - page 482 / 566
» A resource-based analysis of IT sourcing
Sort
View
103
Voted
JIB
2007
88views more  JIB 2007»
15 years 1 months ago
Achieving k-anonymity in DataMarts used for gene expressions exploitation
Gene expression profiling is a sophisticated method to discover differences in activation patterns of genes between different patient collectives. By reasonably defining patient...
Konrad Stark, Johann Eder, Kurt Zatloukal
TSE
2008
113views more  TSE 2008»
15 years 1 months ago
Discovering Neglected Conditions in Software by Mining Dependence Graphs
Neglected conditions are an important but difficult-to-find class of software defects. This paper presents a novel approach for revealing neglected conditions that integrates stati...
Ray-Yaung Chang, Andy Podgurski, Jiong Yang
JNCA
2007
75views more  JNCA 2007»
15 years 1 months ago
Stateful DDoS attacks and targeted filtering
The goal of a DDoS (distributed denial of service) attack is to completely tie up certain resources so that legitimate users are not able to access a service. It has long been an ...
Shigang Chen, Yong Tang, Wenliang Du
TVCG
2008
112views more  TVCG 2008»
15 years 1 months ago
Chromium Renderserver: Scalable and Open Remote Rendering Infrastructure
Abstract-Chromium Renderserver (CRRS) is software infrastructure that provides the ability for one or more users to run and view image output from unmodified, interactive OpenGL an...
Brian E. Paul, Sean Ahern, E. Wes Bethel, Eric Bru...
CVIU
2004
99views more  CVIU 2004»
15 years 1 months ago
Synchronization of oscillations for machine perception of gaits
Substantial evidence supports a relationship between gait perception and gait synthesis. Furthermore, passive mechanical systems demonstrate that the jointed leg systems of humans...
Jeffrey E. Boyd