Sciweavers

1548 search results - page 217 / 310
» Estimating Software Vulnerabilities
Sort
View
CASES
2008
ACM
15 years 1 months ago
Cache-aware cross-profiling for java processors
Performance evaluation of embedded software is essential in an early development phase so as to ensure that the software will run on the embedded device's limited computing r...
Walter Binder, Alex Villazón, Martin Schoeb...
HPCA
2004
IEEE
15 years 11 months ago
Wavelet Analysis for Microprocessor Design: Experiences with Wavelet-Based dI/dt Characterization
As microprocessors become increasingly complex, the techniques used to analyze and predict their behavior must become increasingly rigorous. This paper applies wavelet analysis te...
Russ Joseph, Zhigang Hu, Margaret Martonosi
SIGCOMM
2009
ACM
15 years 5 months ago
Cross-layer wireless bit rate adaptation
This paper presents SoftRate, a wireless bit rate adaptation protocol that is responsive to rapidly varying channel conditions. Unlike previous work that uses either frame recepti...
Mythili Vutukuru, Hari Balakrishnan, Kyle Jamieson
BMCBI
2008
105views more  BMCBI 2008»
14 years 11 months ago
A Bayesian method for calculating real-time quantitative PCR calibration curves using absolute plasmid DNA standards
Background: In real-time quantitative PCR studies using absolute plasmid DNA standards, a calibration curve is developed to estimate an unknown DNA concentration. However, potenti...
Mano Sivaganesan, Shawn Seifring, Manju Varma, Ric...
BIOINFORMATICS
2007
190views more  BIOINFORMATICS 2007»
14 years 11 months ago
Towards clustering of incomplete microarray data without the use of imputation
Motivation: Clustering technique is used to find groups of genes that show similar expression patterns under multiple experimental conditions. Nonetheless, the results obtained by...
Dae-Won Kim, Ki Young Lee, Kwang H. Lee, Doheon Le...