Sciweavers

1815 search results - page 359 / 363
» Making the Business Case for Software Performance Engineerin...
Sort
View
CCS
2010
ACM
13 years 7 months ago
AccessMiner: using system-centric models for malware protection
Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
FPGA
2010
ACM
232views FPGA» more  FPGA 2010»
13 years 7 months ago
High-throughput bayesian computing machine with reconfigurable hardware
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Mingjie Lin, Ilia Lebedev, John Wawrzynek
BMCBI
2008
118views more  BMCBI 2008»
13 years 7 months ago
DOVIS: an implementation for high-throughput virtual screening using AutoDock
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
GIS
2010
ACM
13 years 5 months ago
Towards location-based social networking services
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
Chi-Yin Chow, Jie Bao 0003, Mohamed F. Mokbel
VRST
2009
ACM
14 years 2 months ago
Judgment of natural perspective projections in head-mounted display environments
The display units integrated in todays head-mounted displays (HMDs) provide only a limited field of view (FOV) to the virtual world. In order to present an undistorted view to th...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Scot...