Sciweavers

159 search results - page 30 / 32
» Making the Most of IT Governance Software: Understanding Imp...
Sort
View
156
Voted
EUROSYS
2010
ACM
16 years 20 days ago
Kivati: Fast Detection and Prevention of Atomicity Violations
Bugs in concurrent programs are extremely difficult to find and fix during testing. In this paper, we propose Kivati, which can efficiently detect and prevent atomicity violat...
Lee Chew, David Lie
140
Voted
SIGUCCS
2003
ACM
15 years 8 months ago
How to recruit, motivate and retain effective student workers?
Louisiana State University’s Biomedical Research Center is on a tight state funded budget, as are most state educational institutions. Resources are constantly being exhausted a...
Claire C. Lassalle, Robyn C. Richard
140
Voted
CF
2010
ACM
15 years 7 months ago
A communication infrastructure for a million processor machine
: The SpiNNaker machine is a massively parallel computing system, consisting of 1,000,000 cores. From one perspective, it has a place in Flynns' taxonomy: it is a straightforw...
Andrew D. Brown, Steve Furber, Jeff S. Reeve, Pete...
BMCBI
2002
100views more  BMCBI 2002»
15 years 3 months ago
An algorithm and program for finding sequence specific oligo-nucleotide probes for species identification
Background: The identification of species or species groups with specific oligo-nucleotides as molecular signatures is becoming increasingly popular for bacterial samples. However...
Alexander E. Pozhitkov, Diethard Tautz
168
Voted
WCRE
1999
IEEE
15 years 7 months ago
Chava: Reverse Engineering and Tracking of Java Applets
Java applets have been used increasingly on web sites to perform client-side processing and provide dynamic content. While many web site analysis tools are available, their focus ...
Jeffrey L. Korn, Yih-Farn Chen, Eleftherios Koutso...