Sciweavers

645 search results - page 127 / 129
» Measuring technology effects on software change cost
Sort
View
82
Voted
CIT
2006
Springer
15 years 2 months ago
A new collision resistant hash function based on optimum dimensionality reduction using Walsh-Hadamard transform
Hash functions play the most important role in various cryptologic applications, ranging from data integrity checking to digital signatures. Our goal is to introduce a new hash fu...
Barzan Mozafari, Mohammad Hasan Savoji
85
Voted
BMCBI
2006
86views more  BMCBI 2006»
14 years 10 months ago
Identification of QTLs controlling gene expression networks defined a priori
Background: Gene expression microarrays allow the quantification of transcript accumulation for many or all genes in a genome. This technology has been utilized for a range of inv...
Daniel J. Kliebenstein, Marilyn A. L. West, Hans v...
74
Voted
CCE
2006
14 years 10 months ago
Modeling and temperature control of rapid thermal processing
In the past few years, Rapid Thermal Processes (RTP) have gained acceptance as mainstream technology for semi-conductors manufacturing. These processes are characterized by a sing...
Eyal Dassau, Benyamin Grosman, Daniel R. Lewin
ASPLOS
2010
ACM
15 years 5 months ago
Shoestring: probabilistic soft error reliability on the cheap
Aggressive technology scaling provides designers with an ever increasing budget of cheaper and faster transistors. Unfortunately, this trend is accompanied by a decline in individ...
Shuguang Feng, Shantanu Gupta, Amin Ansari, Scott ...
91
Voted
CCS
2007
ACM
15 years 4 months ago
Stealthy malware detection through vmm-based "out-of-the-box" semantic view reconstruction
An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Xuxian Jiang, Xinyuan Wang, Dongyan Xu