Sciweavers

67 search results - page 10 / 14
» An example of a computable absolutely normal number
Sort
View
ICPP
1998
IEEE
15 years 1 months ago
Performance Implications of Architectural and Software Techniques on I/O-Intensive Applications
Many large scale applications, have significant I/O requirements as well as computational and memory requirements. Unfortunately, limited number of I/O nodes provided by the conte...
Meenakshi A. Kandaswamy, Mahmut T. Kandemir, Alok ...
91
Voted
TPDS
2002
75views more  TPDS 2002»
14 years 9 months ago
An Experimental Evaluation of I/O Optimizations on Different Applications
Many large scale applications have significant I/O requirements as well as computational and memory requirements. Unfortunately, the limited number of I/O nodes provided in a typic...
Meenakshi A. Kandaswamy, Mahmut T. Kandemir, Alok ...
SOUPS
2009
ACM
15 years 4 months ago
Usability and security of out-of-band channels in secure device pairing protocols
Initiating and bootstrapping secure, yet low-cost, ad-hoc transactions is an important challenge that needs to be overcome if the promise of mobile and pervasive computing is to b...
Ronald Kainda, Ivan Flechais, A. W. Roscoe
BMCBI
2010
96views more  BMCBI 2010»
14 years 9 months ago
A statistical framework for differential network analysis from microarray data
Background: It has been long well known that genes do not act alone; rather groups of genes act in consort during a biological process. Consequently, the expression levels of gene...
Ryan Gill, Somnath Datta, Susmita Datta
97
Voted
IJDE
2006
95views more  IJDE 2006»
14 years 9 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum