Sciweavers

3206 search results - page 596 / 642
» How minds can be computational systems
Sort
View
CCS
2007
ACM
14 years 1 months ago
Memsherlock: an automated debugger for unknown memory corruption vulnerabilities
Software vulnerabilities have been the main contributing factor to the Internet security problems such as fast spreading worms. Among these software vulnerabilities, memory corrup...
Emre Can Sezer, Peng Ning, Chongkyung Kil, Jun Xu
PLDI
2003
ACM
14 years 29 days ago
Compile-time dynamic voltage scaling settings: opportunities and limits
With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-t...
Fen Xie, Margaret Martonosi, Sharad Malik
ADL
1998
Springer
189views Digital Library» more  ADL 1998»
13 years 12 months ago
Semantic Relations in a Medical Digital Library
ct In this paper, we describe the VesaliusTM Project, a multi-modal collection of anatomical resourcesunder development at Columbia University. 1 Our focus is on the need for navig...
Nina Wacholder, Celina Imielinska, Judith Klavans,...
CIKM
2011
Springer
12 years 7 months ago
Exploiting longer cycles for link prediction in signed networks
We consider the problem of link prediction in signed networks. Such networks arise on the web in a variety of ways when users can implicitly or explicitly tag their relationship w...
Kai-Yang Chiang, Nagarajan Natarajan, Ambuj Tewari...
ECCV
2006
Springer
14 years 9 months ago
Face Recognition from Video Using the Generic Shape-Illumination Manifold
Abstract. In spite of over two decades of intense research, illumination and pose invariance remain prohibitively challenging aspects of face recognition for most practical applica...
Ognjen Arandjelovic, Roberto Cipolla