Sciweavers

324 search results - page 62 / 65
» Detecting common elements of types
Sort
View
VEE
2006
ACM
142views Virtualization» more  VEE 2006»
14 years 1 months ago
Secure and practical defense against code-injection attacks using software dynamic translation
One of the most common forms of security attacks involves exploiting a vulnerability to inject malicious code into an executing application and then cause the injected code to be ...
Wei Hu, Jason Hiser, Daniel Williams, Adrian Filip...
INFOCOM
2003
IEEE
14 years 22 days ago
Performance anomaly of 802.11b
— We analyze the performance of the IEEE 802.11b wireless local area networks. We have observed that when some mobile hosts use a lower bit rate than the others, the performance ...
Gilles Berger-Sabbatel, Franck Rousseau, Martin He...
SOFTVIS
2010
ACM
13 years 7 months ago
AllocRay: memory allocation visualization for unmanaged languages
A programs memory system performance is one of the key determinants of its overall performance. Lack of understanding of a programs memory system behavior can lead to performance ...
George G. Robertson, Trishul M. Chilimbi, Bongshin...
BMCBI
2010
105views more  BMCBI 2010»
13 years 7 months ago
GWAMA: software for genome-wide association meta-analysis
Background: Despite the recent success of genome-wide association studies in identifying novel loci contributing effects to complex human traits, such as type 2 diabetes and obesi...
Reedik Mägi, Andrew P. Morris
BMCBI
2007
116views more  BMCBI 2007»
13 years 7 months ago
Ranked Adjusted Rand: integrating distance and partition information in a measure of clustering agreement
Background: Biological information is commonly used to cluster or classify entities of interest such as genes, conditions, species or samples. However, different sources of data c...
Francisco R. Pinto, João A. Carriço,...