Sciweavers

1376 search results - page 225 / 276
» Monitoring Software Requirements Using Instrumented Code
Sort
View
CODES
1999
IEEE
15 years 2 months ago
How standards will enable hardware/software co-design
o much higher levels of abstraction than today's design practices, which are usually at the level of synthesizable RTL for custom hardware or Instruction Set Simulator (ISS) f...
Mark Genoe, Christopher K. Lennard, Joachim Kunkel...
MM
2004
ACM
142views Multimedia» more  MM 2004»
15 years 3 months ago
Parsing and browsing tools for colonoscopy videos
Colonoscopy is an important screening tool for colorectal cancer. During a colonoscopic procedure, a tiny video camera at the tip of the endoscope generates a video signal of the ...
Yu Cao, Dalei Li, Wallapak Tavanapong, Jung-Hwan O...
BMCBI
2008
117views more  BMCBI 2008»
14 years 9 months ago
CrossHybDetector: detection of cross-hybridization events in DNA microarray experiments
Background: DNA microarrays contain thousands of different probe sequences represented on their surface. These are designed in such a way that potential cross-hybridization reacti...
Paolo Uva, Emanuele de Rinaldis
SIGMOD
2010
ACM
215views Database» more  SIGMOD 2010»
15 years 1 months ago
Dynamic symbolic database application testing
A database application differs form regular applications in that some of its inputs may be database queries. The program will execute the queries on a database and may use any re...
Chengkai Li, Christoph Csallner
SP
2008
IEEE
144views Security Privacy» more  SP 2008»
15 years 4 months ago
Cloaker: Hardware Supported Rootkit Concealment
Rootkits are used by malicious attackers who desire to run software on a compromised machine without being detected. They have become stealthier over the years as a consequence of...
Francis M. David, Ellick Chan, Jeffrey C. Carlyle,...