Sciweavers

452 search results - page 73 / 91
» Interfacing Trusted Applications with Intrusion Detection Sy...
Sort
View
CASES
2008
ACM
14 years 11 months ago
A light-weight cache-based fault detection and checkpointing scheme for MPSoCs enabling relaxed execution synchronization
While technology advances have made MPSoCs a standard architecture for embedded systems, their applicability is increasingly being challenged by dramatic increases in the amount o...
Chengmo Yang, Alex Orailoglu
SIGMOD
2006
ACM
219views Database» more  SIGMOD 2006»
15 years 9 months ago
Modeling skew in data streams
Data stream applications have made use of statistical summaries to reason about the data using nonparametric tools such as histograms, heavy hitters, and join sizes. However, rela...
Flip Korn, S. Muthukrishnan, Yihua Wu
DEBU
1998
115views more  DEBU 1998»
14 years 9 months ago
The Case for Non-transparent Replication: Examples from Bayou
Applications that rely on replicated data have different requirements for how their data is managed. For example, some applications may require that updates propagate amongst repl...
Douglas B. Terry, Karin Petersen, Mike Spreitzer, ...
76
Voted
WWW
2003
ACM
15 years 10 months ago
Detecting web page structure for adaptive viewing on small form factor devices
Mobile devices have already been widely used to access the Web. However, because most available web pages are designed for desktop PC in mind, it is inconvenient to browse these l...
Yu Chen, Wei-Ying Ma, HongJiang Zhang
BMCBI
2006
127views more  BMCBI 2006»
14 years 9 months ago
PathogenMIPer: a tool for the design of molecular inversion probes to detect multiple pathogens
Background: Here we describe PathogenMIPer, a software program for designing molecular inversion probe (MIP) oligonucleotides for use in pathogen identification and detection. The...
Sreedevi Thiyagarajan, Miloslav Karhanek, Michael ...