Sciweavers

503 search results - page 96 / 101
» Automatic Verification of Strongly Dynamic Software Systems
Sort
View
83
Voted
UIST
2009
ACM
15 years 4 months ago
Activity analysis enabling real-time video communication on mobile phones for deaf users
We describe our system called MobileASL for real-time video communication on the current U.S. mobile phone network. The goal of MobileASL is to enable Deaf people to communicate w...
Neva Cherniavsky, Jaehong Chon, Jacob O. Wobbrock,...
CASES
2007
ACM
15 years 1 months ago
Recursive function data allocation to scratch-pad memory
This paper presents the first automatic scheme to allocate local (stack) data in recursive functions to scratch-pad memory (SPM) in embedded systems. A scratch-pad is a fast direct...
Angel Dominguez, Nghi Nguyen, Rajeev Barua
BMCBI
2007
181views more  BMCBI 2007»
14 years 9 months ago
Genes2Networks: connecting lists of gene symbols using mammalian protein interactions databases
Background: In recent years, mammalian protein-protein interaction network databases have been developed. The interactions in these databases are either extracted manually from lo...
Seth I. Berger, Jeremy M. Posner, Avi Ma'ayan
EDBT
2012
ACM
246views Database» more  EDBT 2012»
13 years 2 days ago
"Cut me some slack": latency-aware live migration for databases
Cloud-based data management platforms often employ multitenant databases, where service providers achieve economies of scale by consolidating multiple tenants on shared servers. I...
Sean Kenneth Barker, Yun Chi, Hyun Jin Moon, Hakan...
SP
2007
IEEE
135views Security Privacy» more  SP 2007»
15 years 4 months ago
Exploring Multiple Execution Paths for Malware Analysis
Malicious code (or malware) is defined as software that fulfills the deliberately harmful intent of an attacker. Malware analysis is the process of determining the behavior and ...
Andreas Moser, Christopher Krügel, Engin Kird...