Sciweavers

558 search results - page 25 / 112
» Safe and Effective Determinant Evaluation
Sort
View
OSDI
2006
ACM
16 years 2 days ago
BrowserShield: Vulnerability-Driven Filtering of Dynamic HTML
Vulnerability-driven filtering of network data can offer a fast and easy-to-deploy alternative or intermediary to software patching, as exemplified in Shield [43]. In this paper, ...
Charles Reis, John Dunagan, Helen J. Wang, Opher D...
PPOPP
2012
ACM
13 years 7 months ago
DOJ: dynamically parallelizing object-oriented programs
We present Dynamic Out-of-Order Java (DOJ), a dynamic parallelization approach. In DOJ, a developer annotates code blocks as tasks to decouple these blocks from the parent executi...
Yong Hun Eom, Stephen Yang, James Christopher Jeni...
BMCBI
2008
129views more  BMCBI 2008»
14 years 12 months ago
Gene set enrichment analysis for non-monotone association and multiple experimental categories
Background: Recently, microarray data analyses using functional pathway information, e.g., gene set enrichment analysis (GSEA) and significance analysis of function and expression...
Rongheng Lin, Shuangshuang Dai, Richard D. Irwin, ...
APCCM
2008
15 years 1 months ago
A Framework Based Measurements for Evaluating an IS Quality
There is an increasing community of researchers trying to draw attention to the importance of evaluation issues. Some approaches can be followed to evaluate the quality of softwar...
Olfa Lamouchi, Amar Ramdane-Cherif, Nicole L&eacut...
COMPGEOM
2001
ACM
15 years 3 months ago
PRECISE: efficient multiprecision evaluation of algebraic roots and predicates for reliable geometric computation
: Many geometric problems like generalized Voronoi diagrams, medial axis computations and boundary evaluation involve computation and manipulation of non-linear algebraic primitive...
Shankar Krishnan, Mark Foskey, Tim Culver, John Ke...