Sciweavers

773 search results - page 153 / 155
» Evaluation of the SRA Tool Using Data Mining Techniques
Sort
View
SIGSOFT
2008
ACM
14 years 7 months ago
Inter-context control-flow and data-flow test adequacy criteria for nesC applications
NesC is a programming language for applications that run on top of networked sensor nodes. Such an application mainly uses an interrupt to trigger a sequence of operations, known ...
Zhifeng Lai, Shing-Chi Cheung, Wing Kwong Chan
CHI
2009
ACM
14 years 7 months ago
PenLight: combining a mobile projector and a digital pen for dynamic visual overlay
Digital pen systems, originally designed to digitize annotations made on physical paper, are evolving to permit a wider variety of applications. Although the type and quality of p...
Hyunyoung Song, Tovi Grossman, George W. Fitzmauri...
IWCMC
2010
ACM
14 years 2 days ago
Estimating routing symmetry on single links by passive flow measurements
The assumption of routing symmetry is often embedded into traffic analysis and classification tools. This paper uses passively captured network data to estimate the amount of tra...
Wolfgang John, Maurizio Dusi, Kimberly C. Claffy
USS
2008
13 years 9 months ago
CloudAV: N-Version Antivirus in the Network Cloud
Antivirus software is one of the most widely used tools for detecting and stopping malicious and unwanted files. However, the long term effectiveness of traditional hostbased anti...
Jon Oberheide, Evan Cooke, Farnam Jahanian
BMCBI
2010
117views more  BMCBI 2010»
13 years 7 months ago
Identification of NAD interacting residues in proteins
Background: Small molecular cofactors or ligands play a crucial role in the proper functioning of cells. Accurate annotation of their target proteins and binding sites is required...
Hifzur Rahman Ansari, Gajendra P. S. Raghava