The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A new heavy gauge boson, W′, decaying to a muon and a neutrino, is searched for in pp collisions at a centre-of-mass energy of 7 TeV. The data, collected with the CMS detector at the LHC, correspond to an integrated luminosity of 36 pb−1. No significant excess of events above the standard model expectation is found in the transverse mass distribution of the muon–neutrino system. Masses below 1.40...
A measurement of W+W− production in pp collisions at s=7 TeV and a search for the Higgs boson are reported. The W+W− candidates are selected in events with two leptons, either electrons or muons. The measurement is performed using LHC data recorded with the CMS detector, corresponding to an integrated luminosity of 36 pb−1. The pp → W+W− cross section is measured to be 41.1±15.3(stat)±5.8(syst)±4...
To defeat current commercial antivirus software, the virus developers are employing obfuscation techniques to create mutating viruses. The current antivirus software cannot handle the obfuscated viruses well since its detection methods that are based upon static signatures are not resilient to even slight variations in the code that forms the virus. In this paper, we propose a new type of virus signature,...
Current petascale systems have tens of thousands of hardware components and complex system software stacks, which increase the probability of faults occurring during the lifetime of a process. Checkpointing has been a popular method of providing fault tolerance in high-end systems. While considerable research has been done to optimize checkpointing, in practice the method still involves a high-cost...
Current recommender systems based on filtering techniques implement a rather limited model for video content visibility. Most of these systems fall short to provide visual precursor to the user and concentrate only on making more accurate predictions; however, a few of them that focus their attention to the aspect of multimedia (video) item visibility do so in a limited scope. In this paper, we address...
We present a general approach for automatically isolating the root causes of memory-related bugs in software. Our approach is based on the observation that most memory bugs involve uses of corrupted memory locations. By iteratively suppressing (nullifying) the effects of these corrupted memory locations during program execution, our approach gradually isolates the root cause of a memory bug. Our approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.