Sciweavers

1629 search results - page 296 / 326
» Infeasible Code Detection
Sort
View
NAR
2002
138views more  NAR 2002»
13 years 8 months ago
The KEGG databases at GenomeNet
The Kyoto Encyclopedia of Genes and Genomes (KEGG) is the primary database resource of the Japanese GenomeNet service (http://www.genome.ad.jp/) for understanding higher order fun...
Minoru Kanehisa, Susumu Goto, Shuichi Kawashima, A...
SAC
2008
ACM
13 years 8 months ago
A hybrid software-based self-testing methodology for embedded processor
Software-based self-test (SBST) is emerging as a promising technology for enabling at-speed testing of high-speed embedded processors testing in an SoC system. For SBST, test rout...
Tai-Hua Lu, Chung-Ho Chen, Kuen-Jong Lee
ICISS
2010
Springer
13 years 7 months ago
ValueGuard: Protection of Native Applications against Data-Only Buffer Overflows
Abstract. Code injection attacks that target the control-data of an application have been prevalent amongst exploit writers for over 20 years. Today however, these attacks are gett...
Steven Van Acker, Nick Nikiforakis, Pieter Philipp...
MICRO
2010
IEEE
170views Hardware» more  MICRO 2010»
13 years 7 months ago
Tolerating Concurrency Bugs Using Transactions as Lifeguards
Abstract--Parallel programming is hard, because it is impractical to test all possible thread interleavings. One promising approach to improve a multi-threaded program's relia...
Jie Yu, Satish Narayanasamy
JCNS
2010
100views more  JCNS 2010»
13 years 3 months ago
Methods for predicting cortical UP and DOWN states from the phase of deep layer local field potentials
During anesthesia, slow-wave sleep and quiet wakefulness, neuronal membrane potentials collectively switch between de- and hyperpolarized levels, the cortical UP and DOWN states. P...
Aman B. Saleem, Paul Chadderton, John Apergis-Scho...