Sciweavers

182 search results - page 18 / 37
» Exploiting Diversity for Answering Questions
Sort
View
CCS
2010
ACM
13 years 10 months ago
Input generation via decomposition and re-stitching: finding bugs in Malware
Attackers often take advantage of vulnerabilities in benign software, and the authors of benign software must search their code for bugs in hopes of finding vulnerabilities before...
Juan Caballero, Pongsin Poosankam, Stephen McCaman...
KDD
2006
ACM
164views Data Mining» more  KDD 2006»
14 years 10 months ago
Sampling from large graphs
Given a huge real graph, how can we derive a representative sample? There are many known algorithms to compute interesting measures (shortest paths, centrality, betweenness, etc.)...
Jure Leskovec, Christos Faloutsos
CORR
2008
Springer
122views Education» more  CORR 2008»
13 years 9 months ago
To Code or Not To Code in Multi-Hop Relay Channels
Multi-hop relay channels use multiple relay stages, each with multiple relay nodes, to facilitate communication between a source and destination. Previously, distributed space-tim...
Rahul Vaze, Robert W. Heath Jr.
SIGMETRICS
1999
ACM
14 years 2 months ago
Availability and Utility of Idle Memory in Workstation Clusters
In this paper, we examine the availability and utility of idle memory in workstation clusters. We attempt to answer the following questions. First, how much of the total memory in...
Anurag Acharya, Sanjeev Setia
CANDC
2005
ACM
13 years 10 months ago
Comments on selected fundamental aspects of microarray analysis
Microarrays are becoming a ubiquitous tool of research in life sciences. However, the working principles of microarray-based methodologies are often misunderstood or apparently ig...
Alessandra Riva, Anne-Sophie Carpentier, Bruno Tor...