Sciweavers

43264 search results - page 8311 / 8653
» Comparing models of computation
Sort
View
COMPSEC
2002
185views more  COMPSEC 2002»
15 years 3 months ago
A framework for understanding and predicting insider attacks
In this paper an insider attack is considered to be deliberate misuse by those who are authorized to use computers and networks. Applying this definition in real-life settings to ...
E. Eugene Schultz
MICRO
2000
IEEE
72views Hardware» more  MICRO 2000»
15 years 3 months ago
PipeRench implementation of the instruction path coprocessor
This paper demonstrates how an Instruction Path Coprocessor (I-COP) can be efficiently implemented using the PipeRench reconfigurable architecture. An I-COP is a programmable on-c...
Yuan C. Chou, Pazhani Pillai, Herman Schmit, John ...
NAR
2000
93views more  NAR 2000»
15 years 2 months ago
Olfactory Receptor Database: a sensory chemoreceptor resource
The Olfactory Receptor Database (ORDB) is a WWWaccessible database that has been expanded from an olfactory receptor resource to a chemoreceptor resource. It stores data on six cl...
Emmanouil Skoufos, Luis N. Marenco, Prakash M. Nad...
EWC
2002
86views more  EWC 2002»
15 years 2 months ago
On Object-Oriented Frameworks and Coordinate Free Formulations of PDEs
An object-oriented (OO) framework for Partial tial Equations (PDEs) provides software abstractions for numerical simulation of PDEs. The design of such frameworks is not trivial, a...
Magne Haveraaen, Hans Z. Munthe-Kaas, Krister &Ari...
NRHM
2000
95views more  NRHM 2000»
15 years 2 months ago
Hybrid narrative and categorical strategies for interactive and dynamic video presentation generation
There are a number of different approaches for automatically selecting video clips from a video database and sequencing them into meaningful presentations for viewers. The video d...
Craig A. Lindley, Frank Nack
« Prev « First page 8311 / 8653 Last » Next »