Sciweavers

1404 search results - page 110 / 281
» Increasing Concurrency in Databases Using Program Analysis
Sort
View
136
Voted
CODES
2007
IEEE
15 years 8 months ago
Ensuring secure program execution in multiprocessor embedded systems: a case study
Multiprocessor SoCs are increasingly deployed in embedded systems with little or no security features built in. Code Injection attacks are one of the most commonly encountered sec...
Krutartha Patel, Sridevan Parameswaran, Seng Lin S...
153
Voted
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
13 years 4 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
132
Voted
PADL
2010
Springer
15 years 11 months ago
Similar Code Detection and Elimination for Erlang Programs
A well-known bad code smell in refactoring and software maintenance is duplicated code, that is the existence of code clones, which are code fragments that are identical or similar...
Huiqing Li, Simon Thompson
90
Voted
BMCBI
2006
91views more  BMCBI 2006»
15 years 2 months ago
PeanutMap: an online genome database for comparative molecular maps of peanut
Background: Molecular maps have been developed for many species, and are of particular importance for varietal development and comparative genomics. However, despite the existence...
Arun M. Jesubatham, Mark D. Burow
113
Voted
BMCBI
2005
93views more  BMCBI 2005»
15 years 2 months ago
Identification of novel prognostic markers in cervical intraepithelial neoplasia using LDMAS (LOH Data Management and Analysis S
Background: Detection of Loss of Heterozygosity (LOH) is one of the most common molecular applications in the study of human diseases, in particular cancer. The technique is commo...
Rifat A. Hamoudi, Amina El-Hamidi, Ming-Qing Du