Sciweavers

1155 search results - page 171 / 231
» Computer aided analysis and design of power transformers
Sort
View
WORM
2003
15 years 2 months ago
Detection of injected, dynamically generated, and obfuscated malicious code
This paper presents DOME, a host-based technique for detecting several general classes of malicious code in software executables. DOME uses static analysis to identify the locatio...
Jesse C. Rabek, Roger I. Khazan, Scott M. Lewandow...
BMCBI
2005
152views more  BMCBI 2005»
15 years 1 months ago
Improved profile HMM performance by assessment of critical algorithmic features in SAM and HMMER
Background: Profile hidden Markov model (HMM) techniques are among the most powerful methods for protein homology detection. Yet, the critical features for successful modelling ar...
Markus Wistrand, Erik L. L. Sonnhammer
TITB
2010
138views Education» more  TITB 2010»
14 years 8 months ago
Local structure-based region-of-interest retrieval in brain MR images
The aging population and the growing amount of medical data have increased the need for automated tools in the neurology departments. Although the researchers have been developing ...
Devrim Unay, Ahmet Ekin, Radu S. Jasinschi
DAC
2008
ACM
16 years 2 months ago
ELIAD: efficient lithography aware detailed router with compact post-OPC printability prediction
In this paper, we present ELIAD, an efficient lithography aware detailed router to optimize silicon image after optical proximity correction (OPC) in a correct-by-construction man...
Minsik Cho, Kun Yuan, Yongchan Ban, David Z. Pan
DAC
2004
ACM
16 years 2 months ago
An analytical approach for dynamic range estimation
It has been widely recognized that the dynamic range information of an application can be exploited to reduce the datapath bitwidth of either processors or ASICs, and therefore th...
Bin Wu, Jianwen Zhu, Farid N. Najm