Sciweavers

446 search results - page 26 / 90
» Design and Implementation of the Valid Time for Spatio-Tempo...
Sort
View
OSDI
1996
ACM
13 years 9 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
CBMS
2003
IEEE
14 years 1 months ago
A National Virtual Specimen Database for Early Cancer Detection
Access to biospecimens is essential for enabling cancer biomarker discovery. The National Cancer Institute's (NCI) Early Detection Research Network (EDRN) comprises and integ...
Heather Kincaid, Sean C. Kelly, Daniel J. Crichton...
PVLDB
2010
116views more  PVLDB 2010»
13 years 2 months ago
Schism: a Workload-Driven Approach to Database Replication and Partitioning
We present Schism, a novel workload-aware approach for database partitioning and replication designed to improve scalability of sharednothing distributed databases. Because distri...
Carlo Curino, Yang Zhang, Evan P. C. Jones, Samuel...
NAR
2011
260views Computer Vision» more  NAR 2011»
12 years 11 months ago
ASD: a comprehensive database of allosteric proteins and modulators
Allostery is the most direct, rapid and efficient way of regulating protein function, ranging from the control of metabolic mechanisms to signaltransduction pathways. However, an ...
Zhimin Huang, Liang Zhu, Yan Cao, Geng Wu, Xinyi L...
DATE
2009
IEEE
90views Hardware» more  DATE 2009»
14 years 2 months ago
Property analysis and design understanding
—Verification is a major issue in circuit and system design. Formal methods like bounded model checking (BMC) can guarantee a high quality of the verification. There are severa...
Ulrich Kühne, Daniel Große, Rolf Drechs...