Sciweavers

61 search results - page 5 / 13
» Indirect text entry using one or two keys
Sort
View
ICCD
2006
IEEE
97views Hardware» more  ICCD 2006»
15 years 6 months ago
Pesticide: Using SMT Processors to Improve Performance of Pointer Bug Detection
Pointer bugs associated with dynamically-allocated objects resulting in out-of-bounds memory access are an important class of software bugs. Because such bugs cannot be detected e...
Jin-Yi Wang, Yen-Shiang Shue, T. N. Vijaykumar, Sa...
NAR
2000
152views more  NAR 2000»
14 years 9 months ago
ASDB: database of alternatively spliced genes
Version 2.1 of ASDB (Alternative Splicing Data Base) contains 1922 protein and 2486 DNA sequences. The protein entries from SWISS-PROT are joined into clusters corresponding to al...
I. Dralyuk, Michael Brudno, Mikhail S. Gelfand, Ma...
MCAM
2007
Springer
129views Multimedia» more  MCAM 2007»
15 years 3 months ago
Learning Concepts by Modeling Relationships
Supporting multimedia search has emerged as an important research topic. There are three paradigms on the research spectrum that ranges from the least automatic to the most automat...
Yong Rui, Guo-Jun Qi
DSN
2007
IEEE
15 years 1 months ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
ERCIMDL
2008
Springer
75views Education» more  ERCIMDL 2008»
14 years 11 months ago
Matching Hierarchies Using Shared Objects
One of the main challenges in integrating two hierarchies is determining the correspondence between the edges of each hierarchy. Traditionally, this process, which we call hierarch...
Robert Ikeda, Kai Zhao, Hector Garcia-Molina