Sciweavers

6939 search results - page 1268 / 1388
» Algorithm Engineering for Parallel Computation
Sort
View
ISORC
2003
IEEE
15 years 8 months ago
Probabilistic Simulation-Based Analysis of Complex Real-Time Systems
Many industrial real-time systems have evolved over a long period of time and were initially so simple that it was possible to predict consequences of adding new functionality by ...
Anders Wall, Johan Andersson, Christer Norströ...
NSPW
2003
ACM
15 years 8 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
SIGMOD
2010
ACM
255views Database» more  SIGMOD 2010»
15 years 7 months ago
Large graph processing in the cloud
As the study of graphs, such as web and social graphs, becomes increasingly popular, the requirements of efficiency and programming flexibility of large graph processing tasks c...
Rishan Chen, Xuetian Weng, Bingsheng He, Mao Yang
SIGIR
1992
ACM
15 years 7 months ago
Classifying News Stories using Memory Based Reasoning
ct tasks such as extraction of relational information from text [Young] [Jacobs]. We describe a method for classifying news stories using Alternative systems [Biebricher] [Lewis] u...
Brij M. Masand, Gordon Linoff, David L. Waltz
SP
2010
IEEE
190views Security Privacy» more  SP 2010»
15 years 24 days ago
Noninterference through Secure Multi-execution
A program is defined to be noninterferent if its outputs cannot be influenced by inputs at a higher security level than their own. Various researchers have demonstrated how this pr...
Dominique Devriese, Frank Piessens
« Prev « First page 1268 / 1388 Last » Next »