Sciweavers

2957 search results - page 296 / 592
» Code analysis and CS-XML
Sort
View
PLDI
2009
ACM
15 years 11 months ago
A weakest precondition approach to active attacks analysis
Information flow controls can be used to protect both data confidentiality and data integrity. The certification of the security degree of a program that runs in untrusted envi...
Musard Balliu, Isabella Mastroeni
BMCBI
2010
116views more  BMCBI 2010»
15 years 4 months ago
SEQADAPT: an adaptable system for the tracking, storage and analysis of high throughput sequencing experiments
Background: High throughput sequencing has become an increasingly important tool for biological research. However, the existing software systems for managing and processing these ...
David B. Burdick, Christopher C. Cavnor, Jeremy Ha...
167
Voted
JCPHY
2011
192views more  JCPHY 2011»
14 years 7 months ago
Fast analysis of molecular dynamics trajectories with graphics processing units - Radial distribution function histogramming
The calculation of radial distribution functions (RDFs) from molecular dynamics trajectory data is a common and computationally expensive analysis task. The rate limiting step in ...
Benjamin G. Levine, John E. Stone, Axel Kohlmeyer
SDM
2011
SIAM
370views Data Mining» more  SDM 2011»
14 years 6 months ago
Sparse Latent Semantic Analysis
Latent semantic analysis (LSA), as one of the most popular unsupervised dimension reduction tools, has a wide range of applications in text mining and information retrieval. The k...
Xi Chen, Yanjun Qi, Bing Bai, Qihang Lin, Jaime G....
ISCA
2012
IEEE
208views Hardware» more  ISCA 2012»
13 years 6 months ago
Harmony: Collection and analysis of parallel block vectors
Efficient execution of well-parallelized applications is central to performance in the multicore era. Program analysis tools support the hardware and software sides of this effor...
Melanie Kambadur, Kui Tang, Martha A. Kim