Sciweavers

2625 search results - page 114 / 525
» Applications 2000
Sort
View
USENIX
2000
15 years 5 months ago
Malloc() Performance in a Multithreaded Linux Environment
Network servers make special demands that other types of applications may not make on memory allocators. We describe a simple malloc() microbenchmark suite that tests the ability ...
Chuck Lever, David Boreham
COMPSEC
2000
117views more  COMPSEC 2000»
15 years 3 months ago
Methods for Protecting Password Transmission
Peyravian and Zunic (2000) proposed a password transmission scheme and a password change scheme over an insecure network. Their proposed solutions do not require the use of any sym...
Mohammad Peyravian, Nevenko Zunic
GRAMMARS
2000
100views more  GRAMMARS 2000»
15 years 3 months ago
Tabulation of Automata for Tree-Adjoining Languages
Abstract. We propose a modular design of tabular parsing algorithms for treeadjoining languages. The modularity is made possible by a separation of the parsing strategy from the me...
Miguel A. Alonso, Mark-Jan Nederhof, Eric Villemon...
JCAL
2000
80views more  JCAL 2000»
15 years 3 months ago
An activity-based analysis of hands-on practice methods
The success of exploration-based training is likely to be strongly influenced by what activities the learner undertakes during training. This paper presents a study of the activiti...
Susan Wiedenbeck, J. A. Zavala, Jason Nawyn
MOC
2000
68views more  MOC 2000»
15 years 3 months ago
Numerical approximations of one-dimensional linear conservation equations with discontinuous coefficients
Conservative linear equations arise in many areas of application, including continuum mechanics or high-frequency geometrical optics approximations. This kind of equation admits mo...
Laurent Gosse, François James