Sciweavers

671 search results - page 115 / 135
» On Observing and Constraining Active Systems
Sort
View
101
Voted
ICASSP
2011
IEEE
14 years 4 months ago
Odor stimulus inference based on neural spike signal in rats
This paper presents a novel method for inferring the odor based on neural activities observed from rats’ main olfactory bulbs. Multi-channel extra-cellular single unit recording...
Kyung-Jin You, Hyun Joo Lee, Yiran Lang, Changkyun...
SIGMOD
2007
ACM
158views Database» more  SIGMOD 2007»
16 years 27 days ago
Log-based recovery for middleware servers
We have developed new methods for log-based recovery for middleware servers which involve thread pooling, private inmemory states for clients, shared in-memory state and message i...
Rui Wang 0002, Betty Salzberg, David B. Lomet
97
Voted
ICCD
2006
IEEE
103views Hardware» more  ICCD 2006»
15 years 9 months ago
Architectural Support for Run-Time Validation of Control Flow Transfer
—Current micro-architecture blindly uses the address in the program counter to fetch and execute instructions without validating its legitimacy. Whenever this blind-folded instru...
Yixin Shi, Sean Dempsey, Gyungho Lee
96
Voted
ISSRE
2008
IEEE
15 years 7 months ago
Cost Curve Evaluation of Fault Prediction Models
Prediction of fault prone software components is one of the most researched problems in software engineering. Many statistical techniques have been proposed but there is no consen...
Yue Jiang, Bojan Cukic, Tim Menzies
ACSAC
2007
IEEE
15 years 7 months ago
Countering False Accusations and Collusion in the Detection of In-Band Wormholes
Cooperative intrusion detection techniques for MANETs utilize ordinary computing hosts as network intrusion sensors. If compromised, these hosts may inject bogus data into the int...
Daniel Sterne, Geoffrey Lawler, Richard Gopaul, Br...