Sciweavers

30 search results - page 5 / 6
» Testing by C template metaprograms
Sort
View
CCS
2004
ACM
14 years 28 days ago
Testing network-based intrusion detection signatures using mutant exploits
Misuse-based intrusion detection systems rely on models of attacks to identify the manifestation of intrusive behavior. Therefore, the ability of these systems to reliably detect ...
Giovanni Vigna, William K. Robertson, Davide Balza...
BMCBI
2006
165views more  BMCBI 2006»
13 years 7 months ago
Improving the quality of protein structure models by selecting from alignment alternatives
Background: In the area of protein structure prediction, recently a lot of effort has gone into the development of Model Quality Assessment Programs (MQAPs). MQAPs distinguish hig...
Ingolf Sommer, Stefano Toppo, Oliver Sander, Thoma...
ALGORITHMICA
2002
83views more  ALGORITHMICA 2002»
13 years 7 months ago
A Tutorial for Designing Flexible Geometric Algorithms
The implementation of an algorithm is faced with the issues efficiency, flexibility, and ease-of-use. In this paper, we suggest a design concept that greatly increases the flexibi...
Vikas Kapoor, Dietmar Kühl, Alexander Wolff
FCCM
2006
IEEE
133views VLSI» more  FCCM 2006»
14 years 1 months ago
A Field Programmable RFID Tag and Associated Design Flow
Current Radio Frequency Identification (RFID) systems generally have long design times and low tolerance to changes in specification. This paper describes a field programmable,...
Alex K. Jones, Raymond R. Hoare, Swapna R. Donthar...
PPOPP
2009
ACM
14 years 8 months ago
Serialization sets: a dynamic dependence-based parallel execution model
This paper proposes a new parallel execution model where programmers augment a sequential program with pieces of code called serializers that dynamically map computational operati...
Matthew D. Allen, Srinath Sridharan, Gurindar S. S...