Sciweavers

417 search results - page 80 / 84
» Synthesizing Test Data for Fraud Detection Systems
Sort
View
IPSN
2007
Springer
14 years 1 months ago
Harbor: software-based memory protection for sensor nodes
Many sensor nodes contain resource constrained microcontrollers where user level applications, operating system components, and device drivers share a single address space with no...
Ram Kumar, Eddie Kohler, Mani B. Srivastava
MEDINFO
2007
132views Healthcare» more  MEDINFO 2007»
13 years 9 months ago
Comparing Decision Support Methodologies for Identifying Asthma Exacerbations
Objective: To apply and compare common machine learning techniques with an expert-built Bayesian Network to determine eligibility for asthma guidelines in pediatric emergency depa...
Judith W. Dexheimer, Laura E. Brown, Jeffrey Leego...
MOBISYS
2011
ACM
12 years 10 months ago
Analyzing inter-application communication in Android
Modern smartphone operating systems support the development of third-party applications with open system APIs. In addition to an open API, the Android operating system also provid...
Erika Chin, Adrienne Porter Felt, Kate Greenwood, ...
BMCBI
2008
100views more  BMCBI 2008»
13 years 7 months ago
PatternLab for proteomics: a tool for differential shotgun proteomics
Background: A goal of proteomics is to distinguish between states of a biological system by identifying protein expression differences. Liu et al. demonstrated a method to perform...
Paulo C. Carvalho, Juliana S. G. Fischer, Emily I....
ASPLOS
2010
ACM
14 years 2 months ago
Virtualized and flexible ECC for main memory
We present a general scheme for virtualizing main memory errorcorrection mechanisms, which map redundant information needed to correct errors into the memory namespace itself. We ...
Doe Hyun Yoon, Mattan Erez