Sciweavers

557 search results - page 92 / 112
» Two experiences designing for effective security
Sort
View
BMCBI
2005
160views more  BMCBI 2005»
14 years 11 months ago
Data-poor categorization and passage retrieval for Gene Ontology Annotation in Swiss-Prot
Background: In the context of the BioCreative competition, where training data were very sparse, we investigated two complementary tasks: 1) given a Swiss-Prot triplet, containing...
Frédéric Ehrler, Antoine Geissbü...
MICRO
2007
IEEE
168views Hardware» more  MICRO 2007»
15 years 6 months ago
Global Multi-Threaded Instruction Scheduling
Recently, the microprocessor industry has moved toward chip multiprocessor (CMP) designs as a means of utilizing the increasing transistor counts in the face of physical and micro...
Guilherme Ottoni, David I. August
GRAPHICSINTERFACE
2007
15 years 1 months ago
Can smooth view transitions facilitate perceptual constancy in node-link diagrams?
Many visualizations use smoothly animated transitions to help the user interact with information structures. These transitions are intended to preserve perceptual constancy during...
Maruthappan Shanmugasundaram, Pourang Irani, Carl ...
NDSS
2008
IEEE
15 years 6 months ago
Automated Whitebox Fuzz Testing
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally, fuzz testing tools apply random mutations to well-formed inputs of a progr...
Patrice Godefroid, Michael Y. Levin, David A. Moln...
AOSD
2012
ACM
13 years 7 months ago
Reusing non-functional concerns across languages
Emerging languages are often source-to-source compiled to mainstream ones, which offer standardized, fine-tuned implementations of non-functional concerns (NFCs)—including pers...
Myoungkyu Song, Eli Tilevich