Sciweavers

2613 search results - page 457 / 523
» Proposal for Tools Supporting Component Based Programming
Sort
View
113
Voted
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 7 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
107
Voted
BMCBI
2006
74views more  BMCBI 2006»
15 years 2 months ago
An unsupervised classification scheme for improving predictions of prokaryotic TIS
Background: Although it is not difficult for state-of-the-art gene finders to identify coding regions in prokaryotic genomes, exact prediction of the corresponding translation ini...
Maike Tech, Peter Meinicke
122
Voted
TRIDENTCOM
2008
IEEE
15 years 9 months ago
Virtual integrated TCP testbed (VITT)
Research on TCP performance relies either on simulation programs, which run on a single machine, or on the use of real testbeds, where different machines represent different netwo...
Carlo Caini, Rosario Firrincieli, Renzo Davoli, Da...
125
Voted
NIPS
2007
15 years 4 months ago
A New View of Automatic Relevance Determination
Automatic relevance determination (ARD) and the closely-related sparse Bayesian learning (SBL) framework are effective tools for pruning large numbers of irrelevant features leadi...
David P. Wipf, Srikantan S. Nagarajan
ICS
2010
Tsinghua U.
16 years 1 days ago
Proof-Carrying Data and Hearsay Arguments from Signature Cards
: Design of secure systems can often be expressed as ensuring that some property is maintained at every step of a distributed computation among mutually-untrusting parties. Special...
Alessandro Chiesa, Eran Tromer