Sciweavers

7504 search results - page 1428 / 1501
» Computing with Action Potentials
Sort
View
113
Voted
HM
2007
Springer
137views Optimization» more  HM 2007»
15 years 8 months ago
A Hybrid VNS for Connected Facility Location
The connected facility location (ConFL) problem generalizes the facility location problem and the Steiner tree problem in graphs. Given a graph G = (V, E), a set of customers D ⊆...
Ivana Ljubic
148
Voted
IMA
2007
Springer
132views Cryptology» more  IMA 2007»
15 years 8 months ago
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
Abstract. Software based side-channel attacks allow an unprivileged spy process to extract secret information from a victim (cryptosystem) process by exploiting some indirect leaka...
Onur Aciiçmez, Shay Gueron, Jean-Pierre Sei...
147
Voted
IWMM
2007
Springer
118views Hardware» more  IWMM 2007»
15 years 8 months ago
Detecting and eliminating memory leaks using cyclic memory allocation
We present and evaluate a new technique for detecting and eliminating memory leaks in programs with dynamic memory allocation. This technique observes the execution of the program...
Huu Hai Nguyen, Martin C. Rinard
KDD
2007
ACM
179views Data Mining» more  KDD 2007»
15 years 8 months ago
Mining statistically important equivalence classes and delta-discriminative emerging patterns
The support-confidence framework is the most common measure used in itemset mining algorithms, for its antimonotonicity that effectively simplifies the search lattice. This com...
Jinyan Li, Guimei Liu, Limsoon Wong
110
Voted
OOPSLA
2007
Springer
15 years 8 months ago
Living in the comfort zone
A comfort zone is a tested region of a system’s input space within which it has been observed to behave acceptably. To keep systems operating within their comfort zones, we advo...
Martin C. Rinard
« Prev « First page 1428 / 1501 Last » Next »