Sciweavers

2169 search results - page 319 / 434
» Using Risk Analysis to Evaluate Design Alternatives
Sort
View
CODES
2002
IEEE
15 years 9 months ago
Compiler-directed customization of ASIP cores
This paper presents an automatic method to customize embedded application-specific instruction processors (ASIPs) based on compiler analysis. ASIPs, also known as embedded soft c...
T. Vinod Kumar Gupta, Roberto E. Ko, Rajeev Barua
SOSP
2007
ACM
16 years 1 months ago
Bouncer: securing software by blocking bad input
Attackers exploit software vulnerabilities to control or crash programs. Bouncer uses existing software instrumentation techniques to detect attacks and it generates filters auto...
Manuel Costa, Miguel Castro, Lidong Zhou, Lintao Z...
DSS
2002
139views more  DSS 2002»
15 years 4 months ago
CI Spider: a tool for competitive intelligence on the Web
Competitive Intelligence (CI) aims to monitor a firm's external environment for information relevant to its decision-making process. As an excellent information source, the I...
Hsinchun Chen, Michael Chau, Daniel Dajun Zeng
AUIC
2005
IEEE
15 years 10 months ago
Aiding Text Entry of Foreign Alphabets with Visual Keyboard Plus
Computer keyboards are used to input hundreds of different languages using many different alphabets. Despite this diversity, the physical layout of keyboards is fairly uniform, ...
L. Rennie, Andy Cockburn
BMCBI
2010
132views more  BMCBI 2010»
15 years 4 months ago
Parallel multiplicity and error discovery rate (EDR) in microarray experiments
Background: In microarray gene expression profiling experiments, differentially expressed genes (DEGs) are detected from among tens of thousands of genes on an array using statist...
Wayne Wenzhong Xu, Clay J. Carter