Models based on system calls are a popular and common approach to characterize the run-time behavior of programs. For example, system calls are used by intrusion detection systems...
Andrea Lanzi, Davide Balzarotti, Christopher Krueg...
We use reconfigurable hardware to construct a high throughput Bayesian computing machine (BCM) capable of evaluating probabilistic networks with arbitrary DAG (directed acyclic gr...
Background: Molecular-docking-based virtual screening is an important tool in drug discovery that is used to significantly reduce the number of possible chemical compounds to be i...
Shuxing Zhang, Kamal Kumar, Xiaohui Jiang, Anders ...
Social networking applications have become very important web services that provide Internet-based platforms for their users to interact with their friends. With the advances in t...
The display units integrated in todays head-mounted displays (HMDs) provide only a limited field of view (FOV) to the virtual world. In order to present an undistorted view to th...
Frank Steinicke, Gerd Bruder, Klaus Hinrichs, Scot...