Sciweavers

905 search results - page 70 / 181
» The Case Against Micropayments
Sort
View
BMCBI
2010
155views more  BMCBI 2010»
13 years 5 months ago
BrEPS: a flexible and automatic protocol to compute enzyme-specific sequence profiles for functional annotation
Background: Models for the simulation of metabolic networks require the accurate prediction of enzyme function. Based on a genomic sequence, enzymatic functions of gene products a...
Constantin Bannert, A. Welfle, C. aus dem Spring, ...
IJSSE
2010
80views more  IJSSE 2010»
13 years 5 months ago
Improving Memory Management Security for C and C++
Memory managers are an important part of any modern language: they are used to dynamically allocate memory for use in the program. Many managers exist and depending on the operati...
Yves Younan, Wouter Joosen, Frank Piessens, Hans V...
ICSE
2012
IEEE-ACM
11 years 10 months ago
WhoseFault: Automatic developer-to-fault assignment through fault localization
—This paper describes a new technique, which automatically selects the most appropriate developers for fixing the fault represented by a failing test case, and provides a diagno...
Francisco Servant, James A. Jones
ISCA
2009
IEEE
136views Hardware» more  ISCA 2009»
14 years 2 months ago
Architectural core salvaging in a multi-core processor for hard-error tolerance
The incidence of hard errors in CPUs is a challenge for future multicore designs due to increasing total core area. Even if the location and nature of hard errors are known a prio...
Michael D. Powell, Arijit Biswas, Shantanu Gupta, ...
PET
2005
Springer
14 years 1 months ago
Privacy Vulnerabilities in Encrypted HTTP Streams
Abstract. Encrypting traffic does not prevent an attacker from performing some types of traffic analysis. We present a straightforward traffic analysis attack against encrypted HT...
George Dean Bissias, Marc Liberatore, David Jensen...