Sciweavers

2797 search results - page 130 / 560
» Code query by example
Sort
View
VISSYM
2004
15 years 4 months ago
Volume Visualization and Visual Queries for Large High-Dimensional Datasets
We propose a flexible approach for the visualization of large, high-dimensional datasets. The raw, highdimensional data is mapped into an abstract 3D distance space using the Fast...
Guido Reina, Thomas Ertl
ICCD
2004
IEEE
97views Hardware» more  ICCD 2004»
15 years 12 months ago
Runtime Execution Monitoring (REM) to Detect and Prevent Malicious Code Execution
1 Many computer security threats involve execution of unauthorized foreign code on the victim computer. Viruses, network and email worms, Trojan horses, backdoor programs used in ...
A. Murat Fiskiran, Ruby B. Lee
MCAM
2007
Springer
125views Multimedia» more  MCAM 2007»
15 years 9 months ago
Fingerprinting Codes for Live Pay-Television Broadcast Via Internet
In recent years, with the rapid growth of the Internet as well as the increasing demand for broadband services, live pay-television broadcasting via internet has become a promising...
Shuhui Hou, Tetsutaro Uehara, Yoshitaka Morimura, ...
JSAC
2008
121views more  JSAC 2008»
15 years 2 months ago
Stochastic analysis of network coding in epidemic routing
Epidemic routing has been proposed to reduce the data transmission delay in disruption tolerant wireless networks, in which data can be replicated along multiple opportunistic path...
Yunfeng Lin, Baochun Li, Ben Liang
PAAPP
2006
44views more  PAAPP 2006»
15 years 2 months ago
Revisiting communication code generation algorithms for message-passing systems
In this paper, we investigate algorithms for generating communication code to run on distributedmemory systems. We modify algorithms from previously published work and prove that ...
Clayton S. Ferner