Sciweavers

787 search results - page 134 / 158
» Source code analysis and manipulation
Sort
View
NAR
2007
135views more  NAR 2007»
13 years 9 months ago
g: Profiler - a web-based toolset for functional profiling of gene lists from large-scale experiments
g:Profiler (http://biit.cs.ut.ee/gprofiler/) is a public web server for characterising and manipulating gene lists resulting from mining high-throughput genomic data. g:Profiler h...
Jüri Reimand, Meelis Kull, Hedi Peterson, Jaa...
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
14 years 3 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
SIGMETRICS
2003
ACM
199views Hardware» more  SIGMETRICS 2003»
14 years 3 months ago
Data cache locking for higher program predictability
Caches have become increasingly important with the widening gap between main memory and processor speeds. However, they are a source of unpredictability due to their characteristi...
Xavier Vera, Björn Lisper, Jingling Xue
BMCBI
2010
268views more  BMCBI 2010»
13 years 10 months ago
A high-level 3D visualization API for Java and ImageJ
Background: Current imaging methods such as Magnetic Resonance Imaging (MRI), Confocal microscopy, Electron Microscopy (EM) or Selective Plane Illumination Microscopy (SPIM) yield...
Benjamin Schmid, Johannes E. Schindelin, Albert Ca...
WCET
2010
13 years 7 months ago
Bounding the Effects of Resource Access Protocols on Cache Behavior
The assumption of task independence has long been consubstantial with the formulation of many schedulability analysis techniques. That assumption is evidently advantageous for the...
Enrico Mezzetti, Marco Panunzio, Tullio Vardanega