Sciweavers

2435 search results - page 348 / 487
» System Exploration of SystemC Designs
Sort
View
115
Voted
HOTNETS
2010
14 years 11 months ago
A case for information-bound referencing
Links and content references form the foundation of the way that users interact today. Unfortunately, the links used today (URLs) are fragile since they tightly specify a protocol...
Ashok Anand, Aditya Akella, Vyas Sekar, Srinivasan...
AFRIGRAPH
2004
ACM
15 years 10 months ago
Visualizing 3D scenes using non-linear projections and data mining of previous camera movements
We describe techniques for exploring 3D scenes by combining non-linear projections with the interactive data mining of camera navigations from previous explorations. Our approach ...
Karan Singh, Ravin Balakrishnan
155
Voted
BMCBI
2008
226views more  BMCBI 2008»
15 years 4 months ago
ProteoLens: a visual analytic tool for multi-scale database-driven biological network data mining
Background: New systems biology studies require researchers to understand how interplay among myriads of biomolecular entities is orchestrated in order to achieve high-level cellu...
Tianxiao Huan, Andrey Y. Sivachenko, Scott H. Harr...
ISPASS
2008
IEEE
15 years 11 months ago
Configurational Workload Characterization
Although the best processor design for executing a specific workload does depend on the characteristics of the workload, it can not be determined without factoring-in the effect o...
Hashem Hashemi Najaf-abadi, Eric Rotenberg
148
Voted
IJDE
2006
95views more  IJDE 2006»
15 years 4 months ago
Exploiting the Rootkit Paradox with Windows Memory Analysis
Rootkits are malicious programs that silently subvert an operating system to hide an intruder's activities. Although there are a number of tools designed to detect rootkits, ...
Jesse D. Kornblum