Sciweavers

3404 search results - page 386 / 681
» C Programming Tutorial
Sort
View
DIMVA
2007
15 years 4 months ago
Characterizing Bots' Remote Control Behavior
A botnet is a collection of bots, each generally running on a compromised system and responding to commands over a “commandand-control” overlay network. We investigate observab...
Elizabeth Stinson, John C. Mitchell
114
Voted
APPINF
2003
15 years 4 months ago
Localizing XML Documents through XSLT
Existing efforts on XML internationalization and localization have been focusing on the contents of XML documents instead of on the meta presentations such as tags and attributes...
Yijun Yu, Jianguo Lu, Jing-Hao Xue, Yi Zhang, Weiw...
94
Voted
COOTS
2001
15 years 4 months ago
Multi-Dispatch in the Java Virtual Machine: Design and Implementation
Mainstream object-oriented languages, such as C++ and Java1 , provide only a restricted form of polymorphic methods, namely uni-receiver dispatch. In common programming situations...
Christopher Dutchyn, Paul Lu, Duane Szafron, Steve...
143
Voted
CASCON
2000
119views Education» more  CASCON 2000»
15 years 4 months ago
Efficient mapping of software system traces to architectural views
Information about a software system's execution can help a developer with many tasks, including software testing, performance tuning, and program understanding. In almost all...
Robert J. Walker, Gail C. Murphy, Jeffrey Steinbok...
125
Voted
PPSC
1993
15 years 4 months ago
I/O for TFLOPS Supercomputers
Scalable parallel computers with TFLOPS (Trillion FLoating Point Operations Per Second) performance levels are now under construction. While we believe TFLOPS processor technology...
Erik DeBenedictis, Stephen C. Johnson