Sciweavers

1245 search results - page 247 / 249
» Binary Sparse Coding
Sort
View
USS
2004
15 years 1 months ago
TIED, LibsafePlus: Tools for Runtime Buffer Overflow Protection
Buffer overflow exploits make use of the treatment of strings in C as character arrays rather than as first-class objects. Manipulation of arrays as pointers and primitive pointer...
Kumar Avijit, Prateek Gupta, Deepak Gupta
92
Voted
DYNAMO
2000
87views more  DYNAMO 2000»
15 years 29 days ago
Derive: a tool that automatically reverse-engineers instruction encodings
Many binary tools, such as disassemblers, dynamiccode generation systems, and executable code rewriters, need to understand how machine instructions are encoded. Unfortunately, sp...
Dawson R. Engler, Wilson C. Hsieh
SPRINGSIM
2007
15 years 23 days ago
An architecture for wireless simulation in NS-2 applied to impulse-radio ultra-wide band networks
We present an architecture for implementing a wireless physical layer in a packet-based network simulator. We integrate this architecture in the popular ns-2 network simulator and...
Ruben Merz, Jean-Yves Le Boudec, Jörg Widmer
BMCBI
2010
150views more  BMCBI 2010»
14 years 11 months ago
AMS 3.0: prediction of post-translational modifications
Background: We present here the recent update of AMS algorithm for identification of post-translational modification (PTM) sites in proteins based only on sequence information, us...
Subhadip Basu, Dariusz Plewczynski
BMCBI
2010
268views more  BMCBI 2010»
14 years 11 months ago
A high-level 3D visualization API for Java and ImageJ
Background: Current imaging methods such as Magnetic Resonance Imaging (MRI), Confocal microscopy, Electron Microscopy (EM) or Selective Plane Illumination Microscopy (SPIM) yield...
Benjamin Schmid, Johannes E. Schindelin, Albert Ca...