Sciweavers

1129 search results - page 136 / 226
» Finding Similar Failures Using Callstack Similarity
Sort
View
ACMMSP
2006
ACM
252views Hardware» more  ACMMSP 2006»
14 years 2 months ago
Deconstructing process isolation
Most operating systems enforce process isolation through hardware protection mechanisms such as memory segmentation, page mapping, and differentiated user and kernel instructions....
Mark Aiken, Manuel Fähndrich, Chris Hawblitze...
LREC
2008
75views Education» more  LREC 2008»
13 years 9 months ago
Experimental Fast-Tracking of Morphological Analysers for Nguni Languages
The development of natural language processing (NLP) components is resource-intensive and therefore justifies exploring ways of reducing development time and effort when building ...
Sonja E. Bosch, Laurette Pretorius, Kholisa Podile...
CCS
2009
ACM
14 years 8 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
BMCBI
2010
103views more  BMCBI 2010»
13 years 8 months ago
Detecting internally symmetric protein structures
Background: Many functional proteins have a symmetric structure. Most of these are multimeric complexes, which are made of non-symmetric monomers arranged in a symmetric manner. H...
Changhoon Kim, Jodi Basner, Byungkook Lee
SAFECOMP
2005
Springer
14 years 1 months ago
Are High-Level Languages Suitable for Robust Telecoms Software?
In the telecommunications sector product development must minimise time to market while delivering high levels of dependability, availability, maintainability and scalability. High...
Jan Henry Nyström, Philip W. Trinder, David J...