Sciweavers

295 search results - page 48 / 59
» In-Parameter-Order: A Test Generation Strategy for Pairwise ...
Sort
View
SP
2010
IEEE
178views Security Privacy» more  SP 2010»
14 years 14 days ago
Overcoming an Untrusted Computing Base: Detecting and Removing Malicious Hardware Automatically
The computer systems security arms race between attackers and defenders has largely taken place in the domain of software systems, but as hardware complexity and design processes ...
Matthew Hicks, Murph Finnicum, Samuel T. King, Mil...
CANDC
2009
ACM
14 years 3 months ago
Subliminal wiretapping
Subliminal Wiretapping is a subtly interactive artwork that utilizes random number generation modified through mindmatter effects to supply a continuous stream of words. Frequent,...
Shawn Lawson
IPPS
2007
IEEE
14 years 2 months ago
Optimizing Sorting with Machine Learning Algorithms
The growing complexity of modern processors has made the development of highly efficient code increasingly difficult. Manually developing highly efficient code is usually expen...
Xiaoming Li, María Jesús Garzar&aacu...
BMCBI
2010
132views more  BMCBI 2010»
13 years 8 months ago
Protein docking by Rotation-Based Uniform Sampling (RotBUS) with fast computing of intermolecular contact distance and residue d
Background: Protein-protein interactions are fundamental for the majority of cellular processes and their study is of enormous biotechnological and therapeutic interest. In recent...
Albert Solernou, Juan Fernández-Recio
BMCBI
2006
171views more  BMCBI 2006»
13 years 8 months ago
The effect of oligonucleotide microarray data pre-processing on the analysis of patient-cohort studies
Background: Intensity values measured by Affymetrix microarrays have to be both normalized, to be able to compare different microarrays by removing non-biological variation, and s...
Roel G. W. Verhaak, Frank J. T. Staal, Peter J. M....