Sciweavers

7886 search results - page 1410 / 1578
» An evaluation of bipartitioning techniques
Sort
View
PVLDB
2010
150views more  PVLDB 2010»
13 years 6 months ago
Tree Indexing on Solid State Drives
Large flash disks, or solid state drives (SSDs), have become an attractive alternative to magnetic hard disks, due to their high random read performance, low energy consumption a...
Yinan Li, Bingsheng He, Jun Yang 0001, Qiong Luo, ...
SAS
2010
Springer
121views Formal Methods» more  SAS 2010»
13 years 6 months ago
Alternation for Termination
Proving termination of sequential programs is an important problem, both for establishing the total correctness of systems and as a component of proving more general termination an...
William R. Harris, Akash Lal, Aditya V. Nori, Srir...
TCBB
2010
106views more  TCBB 2010»
13 years 6 months ago
Predicting Novel Human Gene Ontology Annotations Using Semantic Analysis
—The correct interpretation of many molecular biology experiments depends in an essential way on the accuracy and consistency of the existing annotation databases. Such databases...
Bogdan Done, Purvesh Khatri, Arina Done, Sorin Dra...
TVCG
2010
147views more  TVCG 2010»
13 years 6 months ago
"behaviorism": a framework for dynamic data visualization
— While a number of information visualization software frameworks exist, creating new visualizations, especially those that involve novel visualization metaphors, interaction tec...
Angus Forbes, Tobias Höllerer, George Legrady
ACSAC
2010
IEEE
13 years 6 months ago
Comprehensive shellcode detection using runtime heuristics
A promising method for the detection of previously unknown code injection attacks is the identification of the shellcode that is part of the attack vector using payload execution....
Michalis Polychronakis, Kostas G. Anagnostakis, Ev...
« Prev « First page 1410 / 1578 Last » Next »