Sciweavers

300 search results - page 36 / 60
» A study on the value of location privacy
Sort
View
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 19 days ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
ISCAS
2007
IEEE
111views Hardware» more  ISCAS 2007»
14 years 3 months ago
Boundaries Between Fast-and Slow-Scale Bifurcations in Parallel-Connected Buck Converters
Abstract— This paper studies a system of parallelconnected dc/dc converters under master-slave current sharing and proportional-integral (PI) PWM control. Two distinct types of b...
Yuehui Huang, Herbert H. C. Iu, C. K. Michael Tse
ICANNGA
2007
Springer
128views Algorithms» more  ICANNGA 2007»
14 years 2 months ago
A Demonstration of Clustering in Protein Contact Maps for Alpha Helix Pairs
Abstract. The purpose of this work is to demonstrate that it is possible to cluster contact maps for pairs of alpha helices such that each of the clusters corresponds to a group of...
Robert Fraser, Janice I. Glasgow
VL
2003
IEEE
139views Visual Languages» more  VL 2003»
14 years 2 months ago
Programming in a data factory
Among the advantages of visual dataflow programming is that it can give the user a sense of location for the data in a computation. This can help novices build a mental picture of...
Steven L. Tanimoto
IGARSS
2010
13 years 6 months ago
Geospatiotemporal data mining in an early warning system for forest threats in the United States
We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250 m Normalized Difference Vegetation Index (NDVI) values derived from th...
Forrest M. Hoffman, Richard Tran Mills, Jitendra K...