Sciweavers

390 search results - page 77 / 78
» Virtual Attribute Subsetting
Sort
View
ACSAC
2005
IEEE
15 years 5 months ago
Stealth Breakpoints
Microscopic analysis of malicious code (malware) requires the aid of a variety of powerful tools. Chief among them is a debugger that enables runtime binary analysis at an instruc...
Amit Vasudevan, Ramesh Yerraballi
91
Voted
INFOCOM
1993
IEEE
15 years 3 months ago
A Generalized Processor Sharing Approach to Flow Control in Integrated Services Networks: The Multiple Node Case
Worst-casebounds on delay and backlog are derived for leaky bucket constrained sessions in arbitrary topology networks of Generalized Processor Sharing (GPS) 10] servers. The inhe...
Abhay K. Parekh, Robert G. Gallager
FPCA
1989
15 years 3 months ago
Theorems for Free!
Parametric polymorphism constrains the behavior of pure functional programs in a way that allows the derivation of interesting theorems about them solely from their types, i.e., v...
Philip Wadler
BMCBI
2007
104views more  BMCBI 2007»
14 years 11 months ago
Predicting active site residue annotations in the Pfam database
Background: Approximately 5% of Pfam families are enzymatic, but only a small fraction of the sequences within these families (<0.5%) have had the residues responsible for cata...
Jaina Mistry, Alex Bateman, Robert D. Finn
JMLR
2006
96views more  JMLR 2006»
14 years 11 months ago
A Hierarchy of Support Vector Machines for Pattern Detection
We introduce a computational design for pattern detection based on a tree-structured network of support vector machines (SVMs). An SVM is associated with each cell in a recursive ...
Hichem Sahbi, Donald Geman