Sciweavers

35419 search results - page 165 / 7084
» How are we doing
Sort
View
USS
2004
15 years 5 months ago
Fixing Races for Fun and Profit: How to Use access(2)
It is well known that it is insecure to use the access(2) system call in a setuid program to test for the ability of the program's executor to access a file before opening sa...
Drew Dean, Alan J. Hu
AIPS
1998
15 years 5 months ago
How to Solve It Automatically: Selection Among Problem Solving Methods
The choice of an appropriate problem-solving method, from available methods, is a crucial skill for experts in many areas. We describe a technique for the automatic selection amon...
Eugene Fink
NIPS
1994
15 years 5 months ago
Morphogenesis of the Lateral Geniculate Nucleus: How Singularities Affect Global Structure
The macaque lateral geniculate nucleus (LGN) exhibits an intricate lamination pattern, which changes midway through the nucleus at a point coincident with small gaps due to the bl...
Svilen Tzonev, Klaus Schulten, Joseph G. Malpeli
126
Voted
COMCOM
2006
79views more  COMCOM 2006»
15 years 4 months ago
How many sensors for an acceptable breach detection probability?
Determining the required number of sensors to be deployed is a critical decision for surveillance wireless sensor networks. In this paper, we discuss the trade-off between the num...
Ertan Onur, Cem Ersoy, Hakan Deliç
IJFCS
2008
63views more  IJFCS 2008»
15 years 4 months ago
How to Synchronize the Activity of All Components of a P System?
We consider the problem of synchronizing the activity of all the membranes of a P system. After pointing at the connection with a similar problem dealt with in the field of cellul...
Francesco Bernardini, Marian Gheorghe, Maurice Mar...