Sciweavers

225 search results - page 42 / 45
» Kernel Basis Pursuit
Sort
View
SP
2006
IEEE
214views Security Privacy» more  SP 2006»
14 years 3 months ago
Automatically Generating Malicious Disks using Symbolic Execution
Many current systems allow data produced by potentially malicious sources to be mounted as a file system. File system code must check this data for dangerous values or invariant ...
Junfeng Yang, Can Sar, Paul Twohey, Cristian Cadar...
HT
1993
ACM
14 years 1 months ago
Designing Dexter-Based Cooperative Hypermedia Systems
This paper discusses issues for the design of a Dexter-based cooperative hypermedia architecture and a specific system, DeVise Hypermedia (DHM), developed from this architecture. ...
Kaj Grønbæk, Jens A. Hem, Ole Lehrman...
NOSSDAV
1991
Springer
14 years 1 months ago
Multimedia Synchronization and UNIX
One of the most important emerging developments for improving the user/computer interface has been the addition of multimedia facilities to high-performance workstations. Although...
Dick C. A. Bulterman, Robert van Liere
BSDCON
2003
13 years 11 months ago
ULE: A Modern Scheduler for FreeBSD
The existing thread scheduler in FreeBSD was well suited towards the computing environment that it was developed in. As the priorities and hardware targets of the project have cha...
Jeff Roberson
BMCBI
2006
172views more  BMCBI 2006»
13 years 9 months ago
Prediction of cis/trans isomerization in proteins using PSI-BLAST profiles and secondary structure information
Background: The majority of peptide bonds in proteins are found to occur in the trans conformation. However, for proline residues, a considerable fraction of Prolyl peptide bonds ...
Jiangning Song, Kevin Burrage, Zheng Yuan, Thomas ...