Sciweavers

9186 search results - page 1466 / 1838
» A Module System for Scheme
Sort
View
135
Voted
ACSAC
1998
IEEE
15 years 8 months ago
Application-Level Isolation to Cope with Malicious Database Users
System protection mechanisms such as access controls can be fooled by authorized but malicious users, masqueraders, and misfeasors. Intrusion detection techniques are therefore us...
Sushil Jajodia, Peng Liu, Catherine D. McCollum
159
Voted
PG
1997
IEEE
15 years 7 months ago
Rendering of spherical light fields
A plenoptic function is a parameterized function describing the flow of light in space, and has served as a key idea in building some of the recent image-based rendering systems....
Insung Ihm, Sanghoon Park, Rae Kyoung Lee
131
Voted
CCGRID
2001
IEEE
15 years 7 months ago
An Adaptive, Reconfigurable Interconnect for Computational Clusters
This paper describes the principles of an original adaptive interconnect for a computational cluster. Torus topology (2d or 3d) is used as a basis but nodes are allowed to effecti...
Alexander V. Shafarenko, Vladimir Vasekin
130
Voted
FAST
2008
15 years 6 months ago
Improving I/O Performance of Applications through Compiler-Directed Code Restructuring
Ever-increasing complexity of large-scale applications and continuous increases in sizes of the data they process make the problem of maximizing performance of such applications a...
Mahmut T. Kandemir, Seung Woo Son, Mustafa Karak&o...
139
Voted
BIOCOMP
2007
15 years 5 months ago
Stability Analysis of Genetic Regulatory Network with Additive Noises
Background: Genetic regulatory networks (GRN) can be described by differential equations with SUM logic which has been found in many natural systems. Identification of the network...
Yufang Jin
« Prev « First page 1466 / 1838 Last » Next »