As devices become smaller and wireless networking technologies improve, the popularity of mobile computing continues to rise. In today's world, many consider devices such as c...
The popularization of both virtualization and CDP technologies mean that we can now watch disk accesses of systems from entities which are not controlled by the OS. This is a rich...
Naama Parush, Dan Pelleg, Muli Ben-Yehuda, Paula T...
For the analysis of learning processes and the underlying changes of the shape of excitatory synapses (spines), 3-D volume samples of selected dendritic segments are scanned by a ...
Andreas Herzog, Bernd Michaelis, Gerald Krell, Kat...
We present a new technique, failure-oblivious computing, that enables servers to execute through memory errors without memory corruption. Our safe compiler for C inserts checks th...
Martin C. Rinard, Cristian Cadar, Daniel Dumitran,...
Extracting minutiae from fingerprint images is one of the most important steps in automatic fingerprint identification and classification. Minutiae are local discontinuities in th...
Shlomo Greenberg, Mayer Aladjem, Daniel Kogan, Its...