Sciweavers

6474 search results - page 1233 / 1295
» An analysis of diversity measures
Sort
View
SC
2003
ACM
15 years 3 months ago
Identifying and Exploiting Spatial Regularity in Data Memory References
The growing processor/memory performance gap causes the performance of many codes to be limited by memory accesses. If known to exist in an application, strided memory accesses fo...
Tushar Mohan, Bronis R. de Supinski, Sally A. McKe...
SIGIR
2003
ACM
15 years 3 months ago
Automatic image annotation and retrieval using cross-media relevance models
Libraries have traditionally used manual image annotation for indexing and then later retrieving their image collections. However, manual image annotation is an expensive and labo...
Jiwoon Jeon, Victor Lavrenko, R. Manmatha
SIGMETRICS
2003
ACM
136views Hardware» more  SIGMETRICS 2003»
15 years 3 months ago
Internet intrusions: global characteristics and prevalence
Network intrusions have been a fact of life in the Internet for many years. However, as is the case with many other types of Internet-wide phenomena, gaining insight into the glob...
Vinod Yegneswaran, Paul Barford, Johannes Ullrich
SOFTVIS
2003
ACM
15 years 3 months ago
Nice Class Diagrams Admit Good Design?
Analysis and design of programs by using tools has emerged to a standard technique in object-oriented software engineering. Many of these tools claim to implement methods accordin...
Holger Eichelberger
CCS
2003
ACM
15 years 3 months ago
MECA: an extensible, expressive system and language for statically checking security properties
This paper describes a system and annotation language, MECA, for checking security rules. MECA is expressive and designed for checking real systems. It provides a variety of pract...
Junfeng Yang, Ted Kremenek, Yichen Xie, Dawson R. ...
« Prev « First page 1233 / 1295 Last » Next »