Sciweavers

1404 search results - page 110 / 281
» Increasing Concurrency in Databases Using Program Analysis
Sort
View
CODES
2007
IEEE
15 years 7 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
139
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 3 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
PADL
2010
Springer
15 years 9 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
72
Voted
BMCBI
2006
91views more  BMCBI 2006»
15 years 22 days ago
PeanutMap: an online genome database for comparative molecular maps of peanut
Background: Molecular maps have been developed for many species, and are of particular importance for varietal development and comparative genomics. However, despite the existence...
Arun M. Jesubatham, Mark D. Burow
96
Voted
BMCBI
2005
93views more  BMCBI 2005»
15 years 17 days ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du