Sciweavers

5138 search results - page 1027 / 1028
» Low-Entropy Set Selection.
Sort
View
WS
2010
ACM
13 years 4 months ago
Semantic web enabled software analysis
One of the most important decisions researchers face when analyzing software systems is the choice of a proper data analysis/exchange format. In this paper, we present EvoOnt, a s...
Jonas Tappolet, Christoph Kiefer, Abraham Bernstei...
ICISS
2010
Springer
13 years 4 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
IPPS
2010
IEEE
13 years 4 months ago
Performance and energy optimization of concurrent pipelined applications
In this paper, we study the problem of finding optimal mappings for several independent but concurrent workflow applications, in order to optimize performance-related criteria tog...
Anne Benoit, Paul Renaud-Goud, Yves Robert
STOC
2007
ACM
134views Algorithms» more  STOC 2007»
14 years 6 months ago
Hardness of routing with congestion in directed graphs
Given as input a directed graph on N vertices and a set of source-destination pairs, we study the problem of routing the maximum possible number of source-destination pairs on pat...
Julia Chuzhoy, Venkatesan Guruswami, Sanjeev Khann...
BMCBI
2006
107views more  BMCBI 2006»
13 years 6 months ago
A reinforced merging methodology for mapping unique peptide motifs in members of protein families
Background: Members of a protein family often have highly conserved sequences; most of these sequences carry identical biological functions and possess similar three-dimensional (...
Hao-Teng Chang, Tun-Wen Pai, Tan-Chi Fan, Bo-Han S...
« Prev « First page 1027 / 1028 Last » Next »