Sciweavers

2068 search results - page 403 / 414
» On Effectiveness of Application-Layer Coding
Sort
View
CCS
2010
ACM
14 years 12 months ago
BLADE: an attack-agnostic approach for preventing drive-by malware infections
Web-based surreptitious malware infections (i.e., drive-by downloads) have become the primary method used to deliver malicious software onto computers across the Internet. To addr...
Long Lu, Vinod Yegneswaran, Phillip A. Porras, Wen...
SOFTVIS
2010
ACM
14 years 12 months ago
Heapviz: interactive heap visualization for program understanding and debugging
Understanding the data structures in a program is crucial to understanding how the program works, or why it doesn't work. Inspecting the code that implements the data structu...
Edward Aftandilian, Sean Kelley, Connor Gramazio, ...
106
Voted
HVEI
2010
14 years 12 months ago
Preference for art: similarity, statistics, and selling price
Factors governing human preference for artwork have long been studied but there remain many holes in our understanding. Bearing in mind contextual factors (both the conditions und...
Daniel J. Graham, Jay D. Friedenberg, Cyrus H. McC...
AC
2008
Springer
14 years 11 months ago
Computing with RFID- Drivers, Technology and Implications
Radio Frequency Identification or simply rfid has come to be an integral part of modern computing. Rfid is notable in that it is the first practical technology to tightly couple p...
George Roussos
103
Voted
BMCBI
2010
148views more  BMCBI 2010»
14 years 11 months ago
Calling SNPs without a reference sequence
Background: The most common application for the next-generation sequencing technologies is resequencing, where short reads from the genome of an individual are aligned to a refere...
Aakrosh Ratan, Yu Zhang, Vanessa M. Hayes, Stephan...