Sciweavers

848 search results - page 119 / 170
» Understanding Obfuscated Code
Sort
View
KDD
2003
ACM
128views Data Mining» more  KDD 2003»
14 years 10 months ago
Similarity analysis on government regulations
Government regulations are semi-structured text documents that are often voluminous, heavily cross-referenced between provisions and even ambiguous. Multiple sources of regulation...
Gloria T. Lau, Kincho H. Law, Gio Wiederhold
HPCA
2006
IEEE
14 years 10 months ago
The common case transactional behavior of multithreaded programs
Transactional memory (TM) provides an easy-to-use and high-performance parallel programming model for the upcoming chip-multiprocessor systems. Several researchers have proposed a...
JaeWoong Chung, Hassan Chafi, Chi Cao Minh, Austen...
RECOMB
2006
Springer
14 years 10 months ago
Phylogenetic Profiling of Insertions and Deletions in Vertebrate Genomes
Micro-indels are small insertion or deletion events (indels) that occur during genome evolution. The study of micro-indels is important, both in order to better understand the unde...
Sagi Snir, Lior Pachter
DCC
2006
IEEE
14 years 9 months ago
Distributed Sampling and Compression of Scenes with Finite Rate of Innovation in Camera Sensor Networks
We study the problem of distributed sampling and compression in sensor networks when the sensors are digital cameras that acquire a 3-D visual scene of interest from different vie...
Nicolas Gehrig, Pier Luigi Dragotti
CSCW
2010
ACM
14 years 6 months ago
Is it really about me?: message content in social awareness streams
In this work we examine the characteristics of social activity and patterns of communication on Twitter, a prominent example of the emerging class of communication systems we call...
Mor Naaman, Jeffrey Boase, Chih-Hui Lai