Sciweavers

1989 search results - page 316 / 398
» A framework for testing database applications
Sort
View
HPCA
2005
IEEE
14 years 8 months ago
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Datab...
Feng Qin, Shan Lu, Yuanyuan Zhou
CLUSTER
2009
IEEE
14 years 2 months ago
Analyzing massive astrophysical datasets: Can Pig/Hadoop or a relational DBMS help?
Abstract— As the datasets used to fuel modern scientific discovery grow increasingly large, they become increasingly difficult to manage using conventional software. Parallel d...
Sarah Loebman, Dylan Nunley, YongChul Kwon, Bill H...
ICIP
2008
IEEE
14 years 2 months ago
Model-based compression of nonstationary landmark shape sequences
We have proposed a novel model-based compression technique for nonstationary landmark shape data extracted from video sequences. The main goal is to develop a technique for the co...
Samarjit Das, Namrata Vaswani
ISBRA
2007
Springer
14 years 2 months ago
Wavelet Image Interpolation (WII): A Wavelet-Based Approach to Enhancement of Digital Mammography Images
Abstract. Cancer detection using mammography focuses on characteristics of tiny microcalcifications, including the number, size, and spatial arrangement of microcalcification clu...
Gordana Derado, F. DuBois Bowman, Rajan Patel, Mar...
CCECE
2006
IEEE
14 years 2 months ago
Dynamic and Parallel Approaches to Optimal Evolutionary Tree Construction
Phylogenetic trees are commonly reconstructed based on hard optimization problems such as Maximum parsimony (MP) and Maximum likelihood (ML). Conventional MP heuristics for produc...
Anupam Bhattacharjee, Kazi Zakia Sultana, Zalia Sh...