Sciweavers

1711 search results - page 143 / 343
» Completing pseudojump operators
Sort
View
ICCAD
2004
IEEE
135views Hardware» more  ICCAD 2004»
14 years 5 months ago
Soft self-synchronising codes for self-calibrating communication
Self-calibrating designs are gaining momentum in both the computation and communication worlds. Instead of relying on the worst-case characterisation of design parameters, self-ca...
Frederic Worm, Paolo Ienne, Patrick Thiran
CHI
2010
ACM
14 years 3 months ago
How does search behavior change as search becomes more difficult?
Search engines make it easy to check facts online, but finding some specific kinds of information sometimes proves to be difficult. We studied the behavioral signals that suggest ...
Anne Aula, Rehan M. Khan, Zhiwei Guan
CCS
2010
ACM
14 years 3 months ago
A logic for authorization provenance
In distributed environments, statements from a number of principals, besides the central trusted party, may influence the derivations of authorization decisions. However, existin...
Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu
EDBT
2010
ACM
117views Database» more  EDBT 2010»
14 years 3 months ago
Anchoring millions of distinct reads on the human genome within seconds
With the advent of next-generation DNA sequencing machines, there is an increasing need for the development of computational tools that can anchor accurately and expediently the m...
Tien Huynh, Michail Vlachos, Isidore Rigoutsos
ACSAC
2009
IEEE
14 years 3 months ago
Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
Abstract—By accurately measuring risk for enterprise networks, attack graphs allow network defenders to understand the most critical threats and select the most effective counter...
Kyle Ingols, Matthew Chu, Richard Lippmann, Seth E...