Sciweavers

910 search results - page 160 / 182
» Automatic Metadata Generation using Associative Networks
Sort
View
85
Voted
CCS
2007
ACM
15 years 4 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
74
Voted
CORR
2010
Springer
143views Education» more  CORR 2010»
14 years 10 months ago
Efficient and exact sampling of simple graphs with given arbitrary degree sequence
Uniform sampling from graphical realizations of a given degree sequence is a fundamental component in simulation-based measurements of network observables, with applications rangi...
Charo I. Del Genio, Hyunju Kim, Zoltán Toro...
NEUROSCIENCE
2001
Springer
15 years 2 months ago
Role of the Cerebellum in Time-Critical Goal-Oriented Behaviour: Anatomical Basis and Control Principle
The Brain is a slow computer yet humans can skillfully play games such as tennis where very fast reactions are required. Of particular interest is the evidence for strategic thinki...
Guido Bugmann
GLVLSI
1998
IEEE
124views VLSI» more  GLVLSI 1998»
15 years 2 months ago
Non-Refreshing Analog Neural Storage Tailored for On-Chip Learning
In this research, we devised a new simple technique for statically holding analog weights, which does not require periodic refreshing. It further contains a mechanism to locally u...
Bassem A. Alhalabi, Qutaibah M. Malluhi, Rafic A. ...
SIGMOD
2011
ACM
204views Database» more  SIGMOD 2011»
14 years 1 months ago
Oracle database filesystem
Modern enterprise, web, and multimedia applications are generating unstructured content at unforeseen volumes in the form of documents, texts, and media files. Such content is gen...
Krishna Kunchithapadam, Wei Zhang, Amit Ganesh, Ni...