• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 62
Next 10 →

E.: Automatic clustering of orthologs and inparalogs from pairwise species comparisons.

by Maido Remm , Christian E V Storm , Erik L L Sonnhammer - Journal of Molecular Biology , 2001
"... Orthologs are genes in different species that originate from a single gene in the last common ancestor of these species. Such genes have often retained identical biological roles in the present-day organisms. It is hence important to identify orthologs for transferring functional information betwee ..."
Abstract - Cited by 311 (9 self) - Add to MetaCart
with phylogenetic methods, but these are slow and dif®cult to automate. Automatic clustering methods based on two-way best genome-wide matches on the other hand, have so far not separated in-paralogs from out-paralogs effectively. We present a fully automatic method for ®nding orthologs and inparalogs from two

Whom You Know Matters: Venture Capital Networks and Investment Performance,

by Yael Hochberg , Alexander Ljungqvist , Yang Lu , Steve Drucker , Jan Eberly , Eric Green , Yaniv Grinstein , Josh Lerner , Laura Lindsey , Max Maksimovic , Roni Michaely , Maureen O'hara , Ludo Phalippou Mitch Petersen , Jesper Sorensen , Per Strömberg Morten Sorensen , Yael Hochberg , Johnson - Journal of Finance , 2007
"... Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company inv ..."
Abstract - Cited by 138 (8 self) - Add to MetaCart
Abstract Many financial markets are characterized by strong relationships and networks, rather than arm's-length, spot-market transactions. We examine the performance consequences of this organizational choice in the context of relationships established when VCs syndicate portfolio company

Automatic program repair with evolutionary computation,”

by Stephanie Forrest , Westley Weimer , Stephanie Forrest , Claire Le Goues , Thanhvu Nguyen - Commun. ACM, , 2010
"... Abstract There are many methods for detecting and mitigating software errors but few generic methods for automatically repairing errors once they are discovered. This paper highlights recent work combining program analysis methods with evolutionary computation to automatically repair bugs in off-th ..."
Abstract - Cited by 34 (5 self) - Add to MetaCart
to evolve offthe-shelf legacy software. As the 2008 Field Guide to Genetic Programming notes, "while it is common to describe GP as evolving programs, GP is not typically used to evolve programs in the familiar Turing-complete languages humans normally use for software development. It is instead more

Opaque control-flow integrity.

by Vishwath Mohan , Per Larsen † Stefan Brunthaler , Kevin W Hamlen , Michael Franz - In 22nd Annual Network and Distributed System Security Symposium, NDSS, , 2015
"... Abstract-A new binary software randomization and ControlFlow Integrity (CFI) enforcement system is presented, which is the first to efficiently resist code-reuse attacks launched by informed adversaries who possess full knowledge of the inmemory code layout of victim programs. The defense mitigates ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
the graph of hijackable control-flow edges even from attackers who can view the complete stack, heap, and binary code of the victim process. For maximal efficiency, the integrity checks are implemented using instructions that will soon be hardware-accelerated on commodity x86-x64 processors. The approach

unknown title

by Lydia B. Chilton, Juho Kim, Paul André, Felicia Cordeiro, James A. Landay, Daniel S. Weld, Steven P. Dow, Robert C. Miller, Haoqi Zhang
"... Organizing conference sessions around themes improves the experience for attendees. However, the session creation process can be difficult and time-consuming due to the amount of expertise and effort required to consider alterna-tive paper groupings. We present a collaborative web appli-cation calle ..."
Abstract - Add to MetaCart
Organizing conference sessions around themes improves the experience for attendees. However, the session creation process can be difficult and time-consuming due to the amount of expertise and effort required to consider alterna-tive paper groupings. We present a collaborative web appli-cation called Frenzy to draw on the efforts and knowledge of an entire program committee. Frenzy comprises (a) inter-faces to support large numbers of experts working collec-tively to create sessions, and (b) a two-stage process that decomposes the session-creation problem into meta-data elicitation and global constraint satisfaction. Meta-data elicitation involves a large group of experts working simul-taneously, while global constraint satisfaction involves a smaller group that uses the meta-data to form sessions. We evaluated Frenzy with 48 people during a deployment at the CSCW 2014 program committee meeting. The ses-sion making process was much faster than the traditional process, taking 88 minutes instead of a full day. We found that meta-data elicitation was useful for session creation. Moreover, the sessions created by Frenzy were the basis of the CSCW 2014 schedule. Author Keywords Crowdsourcing; groupware; communitysourcing

Saskatoon By

by Dmytro Dyachuk
"... In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree ..."
Abstract - Add to MetaCart
In presenting this thesis in partial fulfilment of the requirements for a Postgraduate degree

POUR L'OBTENTION DU GRADE DE DOCTEUR ÈS SCIENCES PAR

by Dominique Tschopp, Prof E. Telatar, Prof S. Diggavi, Prof M. Grossglauser, Prof J. -y, Le Boudec, Prof M. Mitzenmacher, Prof S. Shakkottai
"... 2010 to my wife, Joyce, and my family...- Résumé- ..."
Abstract - Add to MetaCart
2010 to my wife, Joyce, and my family...- Résumé-

Human Trust Establishment

by Michael Farb, Manish Burman, Gurtej Singh Ch, Jon Mccune, Adrian Perrig, Michael Farb, Manish Burman, Gurtej Singh, Chandok Jon, Mccune Adrian Perrig , 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract - Add to MetaCart
Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing the desperation of users. To establish a secure basis for Internet communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. Through the exchanged authentic public key, SafeSlinger establishes a secure channel offering secrecy and authenticity, which we use to support secure messaging and file exchange. Essentially, we support an abstraction to safely “sling ” information from one device to another. 1 SafeSlinger also provides an API for importing applications’ public keys into a user’s contact information. By slinging entire contact entries to others, we support secure introductions, as the contact entry includes the SafeSlinger public keys as well as other public keys that were important. As a result, SafeSlinger provides an easy-to-use and understand approach for trust establishment among people. 1.

12 3-Manifold Groups are Virtually Residually p

by Matthias Aschenbrenner, Stefan Friedl, Sr. M. Benigna Fehlner
"... ar ..."
Abstract - Add to MetaCart
Abstract not found

DOI 10.1007/s00778-012-0302-x SPECIAL ISSUE PAPER Automating the database schema evolution process

by Carlo Curino, Hyun Jin, Moon Alin Deutsch, Carlo Zaniolo, C. Curino (b, H. J. Moon, A. Deutsch, C. Zaniolo
"... Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applicati ..."
Abstract - Add to MetaCart
Abstract Supporting database schema evolution repre-sents a long-standing challenge of practical and theoretical importance for modern information systems. In this paper, we describe techniques and systems for automating the critical tasks of migrating the database and rewriting the legacy applications. In addition to labor saving, the ben-efits delivered by these advances are many and include reliable prediction of outcome, minimization of downtime, system-produced documentation, and support for archiving, historical queries, and provenance. The PRISM/PRISM++ system delivers these benefits, by solving the difficult prob-lem of automating the migration of databases and the rewrit-ing of queries and updates. In this paper, we present the PRISM/PRISM++ system and the novel technology that made it possible. In particular, we focus on the difficult and previously unsolved problem of supporting legacy queries and updates under schema and integrity constraints evolution. The PRISM/PRISM++ approach consists in providing the users with a set of SQL-based Schema Modification Opera-tors (SMOs), which describe how the tables in the old schema are modified into those in the new schema. In order to sup-port updates, SMOs are extended with integrity constraints
Next 10 →
Results 1 - 10 of 62
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University