Sciweavers

419 search results - page 75 / 84
» An Automated Approach for Identifying Potential Vulnerabilit...
Sort
View
BMCBI
2006
141views more  BMCBI 2006»
13 years 7 months ago
Identification of consensus RNA secondary structures using suffix arrays
Background: The identification of a consensus RNA motif often consists in finding a conserved secondary structure with minimum free energy in an ensemble of aligned sequences. How...
Mohammad Anwar, Truong Nguyen, Marcel Turcotte
DAC
2003
ACM
14 years 8 months ago
A scalable software-based self-test methodology for programmable processors
Software-based self-test (SBST) is an emerging approach to address the challenges of high-quality, at-speed test for complex programmable processors and systems-on chips (SoCs) th...
Li Chen, Srivaths Ravi, Anand Raghunathan, Sujit D...
TEI
2010
ACM
201views Hardware» more  TEI 2010»
14 years 2 months ago
Objects in play: virtual environments and tactile learning
When creating technology environments for children, consideration needs to be given to how touch, gesture, and physical interactions impact on play and learning. This is particula...
Lillian Spina-Caza
HICSS
2009
IEEE
119views Biometrics» more  HICSS 2009»
14 years 2 months ago
Using Graphics Processors for Parallelizing Hash-Based Data Carving
The ability to detect fragments of deleted image files and to reconstruct these image files from all available fragments on disk is a key activity in the field of digital forensic...
Sylvain Collange, Yoginder S. Dandass, Marc Daumas...
AEI
2006
101views more  AEI 2006»
13 years 7 months ago
Design issues for assistive robotics for the elderly
The worldwide population of elderly people is growing rapidly and in the coming decades the proportion of older people in the developed countries will change significantly. This d...
Qinggang Meng, Mark H. Lee