Sciweavers

1548 search results - page 261 / 310
» Estimating Software Vulnerabilities
Sort
View
BMCBI
2004
100views more  BMCBI 2004»
14 years 11 months ago
Handling multiple testing while interpreting microarrays with the Gene Ontology Database
Background: The development of software tools that analyze microarray data in the context of genetic knowledgebases is being pursued by multiple research groups using different me...
Michael V. Osier, Hongyu Zhao, Kei-Hoi Cheung
91
Voted
SIGSOFT
2010
ACM
14 years 9 months ago
Language-based replay via data flow cut
A replay tool aiming to reproduce a program's execution interposes itself at an appropriate replay interface between the program and the environment. During recording, it log...
Ming Wu, Fan Long, Xi Wang, Zhilei Xu, Haoxiang Li...
SIGMOD
2008
ACM
297views Database» more  SIGMOD 2008»
16 years 10 months ago
Automatic Virtual Machine Configuration for Database Workloads
Virtual machine monitors are becoming popular tools for the deployment of database management systems and other enterprise software applications. In this paper, we consider a commo...
Ahmed A. Soror, Ashraf Aboulnaga, Kenneth Salem, P...
ICCV
2001
IEEE
16 years 1 months ago
Robust Principal Component Analysis for Computer Vision
Principal Component Analysis (PCA) has been widely used for the representation of shape, appearance, and motion. One drawback of typical PCA methods is that they are least squares...
Fernando De la Torre, Michael J. Black
86
Voted
ICIP
2006
IEEE
16 years 23 days ago
Image Tampering Identification using Blind Deconvolution
Digital images have been used in growing number of applications from law enforcement and surveillance, to medical diagnosis and consumer photography. With such widespread populari...
Ashwin Swaminathan, Min Wu, K. J. Ray Liu