Sciweavers

280 search results - page 35 / 56
» Redescribing intonational categories with functional data an...
Sort
View
SIGSOFT
2003
ACM
15 years 12 months ago
Protecting C programs from attacks via invalid pointer dereferences
Writes via unchecked pointer dereferences rank high among vulnerabilities most often exploited by malicious code. The most common attacks use an unchecked string copy to cause a b...
Suan Hsi Yong, Susan Horwitz
KDD
2007
ACM
160views Data Mining» more  KDD 2007»
15 years 11 months ago
Show me the money!: deriving the pricing power of product features by mining consumer reviews
The increasing pervasiveness of the Internet has dramatically changed the way that consumers shop for goods. Consumergenerated product reviews have become a valuable source of inf...
Nikolay Archak, Anindya Ghose, Panagiotis G. Ipeir...
SIGMETRICS
2008
ACM
175views Hardware» more  SIGMETRICS 2008»
14 years 11 months ago
DARC: dynamic analysis of root causes of latency distributions
OSprof is a versatile, portable, and efficient profiling methodology based on the analysis of latency distributions. Although OSprof has offers several unique benefits and has bee...
Avishay Traeger, Ivan Deras, Erez Zadok
BMCBI
2010
124views more  BMCBI 2010»
14 years 11 months ago
A factor model to analyze heterogeneity in gene expression
Background: Microarray technology allows the simultaneous analysis of thousands of genes within a single experiment. Significance analyses of transcriptomic data ignore the gene d...
Yuna Blum, Guillaume Le Mignon, Sandrine Lagarrigu...
BMCBI
2007
136views more  BMCBI 2007»
14 years 11 months ago
Genomorama: genome visualization and analysis
Background: The ability to visualize genomic features and design experimental assays that can target specific regions of a genome is essential for modern biology. To assist in the...
Jason D. Gans, Murray Wolinsky