Sciweavers

13717 search results - page 2743 / 2744
» Control Systems
Sort
View
DSD
2002
IEEE
96views Hardware» more  DSD 2002»
14 years 3 months ago
Networks on Silicon: Blessing or Nightmare?
Continuing VLSI technology scaling raises several deep submicron (DSM) problems like relatively slow interconnect, power dissipation and distribution, and signal integrity. Those ...
Paul Wielage, Kees G. W. Goossens
SIGUCCS
1998
ACM
14 years 3 months ago
The ResNet Obstacle Course
There are many ways to train student employees, but hands-on experience is invaluable. To provide our Resident Computer Consultants (RCCs) with the experience they need to solve t...
Kathleen A. Hausmann
SP
2010
IEEE
220views Security Privacy» more  SP 2010»
14 years 2 months ago
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection
—Fuzz testing has proven successful in finding security vulnerabilities in large programs. However, traditional fuzz testing tools have a well-known common drawback: they are in...
Tielei Wang, Tao Wei, Guofei Gu, Wei Zou
AAAI
2008
14 years 1 months ago
RADAR: A Personal Assistant that Learns to Reduce Email Overload
Email client software is widely used for personal task management, a purpose for which it was not designed and is poorly suited. Past attempts to remedy the problem have focused o...
Michael Freed, Jaime G. Carbonell, Geoffrey J. Gor...
BMCBI
2006
156views more  BMCBI 2006»
13 years 11 months ago
Bayesian models for pooling microarray studies with multiple sources of replications
Background: Biologists often conduct multiple but different cDNA microarray studies that all target the same biological system or pathway. Within each study, replicate slides with...
Erin M. Conlon, Joon J. Song, Jun S. Liu
« Prev « First page 2743 / 2744 Last » Next »