Sciweavers

6381 search results - page 1224 / 1277
» Alternative Implementation of the C
Sort
View
CSB
2004
IEEE
152views Bioinformatics» more  CSB 2004»
15 years 8 months ago
EcMLST: An Online Database for Multi Locus Sequence Typing of Pathogenic Escherichia coli
In order to provide a portable and accurate typing system for the unambiguous characterization of pathogenic Escherichia coli isolates to the scientific community, we have constru...
Weihong Qi, David W. Lacher, Alyssa C. Bumbaugh, K...
CASES
2006
ACM
15 years 8 months ago
Probabilistic arithmetic and energy efficient embedded signal processing
Probabilistic arithmetic, where the ith output bit of addition and multiplication is correct with a probability pi, is shown to be a vehicle for realizing extremely energy-efficie...
Jason George, B. Marr, Bilge E. S. Akgul, Krishna ...
DIAL
2004
IEEE
181views Image Analysis» more  DIAL 2004»
15 years 8 months ago
Forensic Handwritten Document Retrieval System
Document storage and retrieval capabilities of the CEDAR-FOX forensic handwritten document examination system are described. The system is designed for automated and semi-automate...
Sargur N. Srihari, Zhixin Shi
CCS
2006
ACM
15 years 8 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...
CCS
2006
ACM
15 years 8 months ago
An effective defense against email spam laundering
Laundering email spam through open-proxies or compromised PCs is a widely-used trick to conceal real spam sources and reduce spamming cost in underground email spam industry. Spam...
Mengjun Xie, Heng Yin, Haining Wang
« Prev « First page 1224 / 1277 Last » Next »