Sciweavers

734 search results - page 146 / 147
» Design and implementation of expressive footwear
Sort
View
106
Voted
OSDI
1996
ACM
15 years 28 days ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
HPDC
2010
IEEE
15 years 21 days ago
Detouring and replication for fast and reliable internet-scale stream processing
iFlow is a replication-based system that can achieve both fast and reliable processing of high volume data streams on the Internet scale. iFlow uses a low degree of replication in...
Christopher McConnell, Fan Ping, Jeong-Hyon Hwang
WISEC
2010
ACM
14 years 11 months ago
Mobile user location-specific encryption (MULE): using your office as your password
Data breaches due to stolen laptops are a major problem. Solutions exist to secure sensitive files on laptops, but are rarely deployed because users view them as inconvenient. Thi...
Ahren Studer, Adrian Perrig
BMCBI
2005
137views more  BMCBI 2005»
14 years 11 months ago
A standard curve based method for relative real time PCR data processing
Background: Currently real time PCR is the most precise method by which to measure gene expression. The method generates a large amount of raw numerical data and processing may no...
Alexey Larionov, Andreas Krause, William Miller
115
Voted
BMCBI
2002
120views more  BMCBI 2002»
14 years 11 months ago
tacg - a grep for DNA
Background: Pattern matching is the core of bioinformatics; it is used in database searching, restriction enzyme mapping, and finding open reading frames. It is done repeatedly ov...
Harry Mangalam