Sciweavers

215 search results - page 37 / 43
» The asymptotic number of binary codes and binary matroids
Sort
View
DSN
2008
IEEE
14 years 11 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
CIIT
2004
14 years 11 months ago
Considerations on the bit error probability of optical CDMA systems
( )1 The most common metric for evaluating the performance of an optical communications system is the symbol error probability (SEP) versus the received optical power. In circuit-l...
Stefano Galli, Ronald Menendez, Russel Fischer, Ro...
PDPTA
2000
14 years 10 months ago
The KIT COSMOS Processor: Introducing CONDOR
Abstract In this paper, we propose a microprocessor architecture which eciently utilizes nextgeneration semiconductor technology. While the technology makes it possible to integrat...
Toshinori Sato, Itsujiro Arita
BMCBI
2004
116views more  BMCBI 2004»
14 years 9 months ago
Array-A-Lizer: A serial DNA microarray quality analyzer
Background: The proliferate nature of DNA microarray results have made it necessary to implement a uniform and quick quality control of experimental results to ensure the consiste...
Andreas Petri, Jan Fleckner, Mads Wichmann Matthie...
SIGKDD
2010
125views more  SIGKDD 2010»
14 years 4 months ago
A framework for mining interesting pattern sets
This paper suggests a framework for mining subjectively interesting pattern sets that is based on two components: (1) the encoding of prior information in a model for the data min...
Tijl De Bie, Kleanthis-Nikolaos Kontonasios, Eirin...