Sciweavers

250 search results - page 7 / 50
» Lost source provenance
Sort
View
DSN
2008
IEEE
13 years 9 months ago
Convicting exploitable software vulnerabilities: An efficient input provenance based approach
Software vulnerabilities are the root cause of a wide range of attacks. Existing vulnerability scanning tools are able to produce a set of suspects. However, they often suffer fro...
Zhiqiang Lin, Xiangyu Zhang, Dongyan Xu
MOBISYS
2007
ACM
14 years 7 months ago
A time-and-value centric provenance model and architecture for medical event streams
Provenance becomes a critical requirement for healthcare IT infrastructures, especially when pervasive biomedical sensors act as a source of raw medical streams for large-scale, a...
Min Wang, Marion Blount, John Davis, Archan Misra,...
BMCBI
2008
121views more  BMCBI 2008»
13 years 7 months ago
iRefIndex: A consolidated protein interaction database with provenance
Background: Interaction data for a given protein may be spread across multiple databases. We set out to create a unifying index that would facilitate searching for these data and ...
Sabry Razick, George Magklaras, Ian M. Donaldson
IOR
2010
112views more  IOR 2010»
13 years 6 months ago
New Policies for the Stochastic Inventory Control Problem with Two Supply Sources
We study an inventory system under periodic review in the presence of two suppliers (or delivery modes). The emergency supplier has a shorter lead-time than the regular supplier, ...
Anshul Sheopuri, Ganesh Janakiraman, Sridhar Sesha...
DCC
1999
IEEE
13 years 12 months ago
Quantized Frame Expansions as Source-Channel Codes for Erasure Channels
Quantized frame expansions are proposed as a method for generalized multiple description coding, where each quantized coe cient is a description. Whereas previous investigations h...
Vivek K. Goyal, Jelena Kovacevic, Martin Vetterli