Sciweavers

1061 search results - page 127 / 213
» A general definition of malware
Sort
View
GIS
2008
ACM
16 years 29 days ago
Detecting single file movement
d Abstract] K. Buchin Dept. Computer Science Utrecht University The Netherlands buchin@cs.uu.nl M. Buchin Dept. Computer Science Utrecht University The Netherlands maike@cs.uu.nl ...
Kevin Buchin, Maike Buchin, Joachim Gudmundsson
GIS
2008
ACM
16 years 29 days ago
An operation-independent approach to extend 2D spatial operations to 3D and moving objects
It has been pointed out repeatedly that spatial operations must be extended to include support for 3D and moving objects. The attempt to code by hand each spatial operation for ea...
Farid Karimipour, Andrew U. Frank, Mahmoud Reza De...
GIS
2005
ACM
16 years 28 days ago
Dimension-refined topological predicates
Topological predicates, as derived from the 9-intersection model, have been widely recognized in GIS, spatial database systems, and many other geo-related disciplines. They are ba...
Mark McKenney, Alejandro Pauly, Reasey Praing, Mar...
GIS
2006
ACM
16 years 28 days ago
Preserving local topological relationships
Topological relationships between objects in space are of great importance in many disciplines. Recently, topological relationships have been defined for complex spatial objects. ...
Mark McKenney, Alejandro Pauly, Reasey Praing, Mar...
DAC
2009
ACM
16 years 27 days ago
Optimal static WCET-aware scratchpad allocation of program code
Caches are notorious for their unpredictability. It is difficult or even impossible to predict if a memory access will result in a definite cache hit or miss. This unpredictabilit...
Heiko Falk, Jan C. Kleinsorge