Sciweavers

365 search results - page 63 / 73
» Liveness in Timed and Untimed Systems
Sort
View
ACSW
2006
13 years 11 months ago
Catching spam before it arrives: domain specific dynamic blacklists
1 The arrival of any piece of unsolicited and unwanted email (spam) into a user's email inbox is a problem. It results in real costs to organisations and possibly an increasin...
Duncan Cook, Jacky Hartnett, Kevin Manderson, Joel...
ACMMSP
2006
ACM
226views Hardware» more  ACMMSP 2006»
14 years 1 months ago
Smarter garbage collection with simplifiers
We introduce a method for providing lightweight daemons, called simplifiers, that attach themselves to program data. If a data item has a simplifier, the simplifier may be run aut...
Melissa E. O'Neill, F. Warren Burton
JSAC
2007
104views more  JSAC 2007»
13 years 9 months ago
Characterizing Peer-to-Peer Streaming Flows
— The fundamental advantage of peer-to-peer (P2P) multimedia streaming applications is to leverage peer upload capacities to minimize bandwidth costs on dedicated streaming serve...
Chuan Wu, Baochun Li, Shuqiao Zhao
BIOINFORMATICS
2011
13 years 4 months ago
Inverse perturbation for optimal intervention in gene regulatory networks
Motivation: Analysis and intervention in the dynamics of gene regulatory networks is at the heart of emerging efforts in the development of modern treatment of numerous ailments i...
Nidhal Bouaynaya, Roman Shterenberg, Dan Schonfeld
LCTRTS
2009
Springer
14 years 4 months ago
A compiler optimization to reduce soft errors in register files
Register file (RF) is extremely vulnerable to soft errors, and traditional redundancy based schemes to protect the RF are prohibitive not only because RF is often in the timing c...
Jongeun Lee, Aviral Shrivastava