Sciweavers

10910 search results - page 2097 / 2182
» Input modeling using a computer algebra system
Sort
View
CODES
2006
IEEE
14 years 11 months ago
Architectural support for safe software execution on embedded processors
The lack of memory safety in many popular programming languages, including C and C++, has been a cause for great concern in the realm of software reliability, verification, and mo...
Divya Arora, Anand Raghunathan, Srivaths Ravi, Nir...
HPCA
2009
IEEE
15 years 10 months ago
Versatile prediction and fast estimation of Architectural Vulnerability Factor from processor performance metrics
The shrinking processor feature size, lower threshold voltage and increasing clock frequency make modern processors highly vulnerable to transient faults. Architectural Vulnerabil...
Lide Duan, Bin Li, Lu Peng
CCS
2006
ACM
15 years 1 months ago
Hot or not: revealing hidden services by their clock skew
Location-hidden services, as offered by anonymity systems such as Tor, allow servers to be operated under a pseudonym. As Tor is an overlay network, servers hosting hidden service...
Steven J. Murdoch
BMCBI
2010
156views more  BMCBI 2010»
14 years 10 months ago
Adaptive coarse-grained Monte Carlo simulation of reaction and diffusion dynamics in heterogeneous plasma membranes
Background: An adaptive coarse-grained (kinetic) Monte Carlo (ACGMC) simulation framework is applied to reaction and diffusion dynamics in inhomogeneous domains. The presented mod...
Stuart Collins, Michail Stamatakis, Dionisios G. V...
CVPR
2007
IEEE
15 years 12 months ago
Discriminative Cluster Refinement: Improving Object Category Recognition Given Limited Training Data
A popular approach to problems in image classification is to represent the image as a bag of visual words and then employ a classifier to categorize the image. Unfortunately, a si...
Liu Yang, Rong Jin, Caroline Pantofaru, Rahul Sukt...
« Prev « First page 2097 / 2182 Last » Next »