Sciweavers

9521 search results - page 1882 / 1905
» Compiling with continuations, continued
Sort
View
NC
2010
137views Neural Networks» more  NC 2010»
14 years 4 months ago
On the regularity of circular splicing languages: a survey and new developments
Circular splicing has been introduced to model a specific recombinant behaviour of circular DNA, continuing the investigation initiated with linear splicing. In this paper we focu...
Paola Bonizzoni, Clelia de Felice, Gabriele Fici, ...
PVLDB
2010
111views more  PVLDB 2010»
14 years 4 months ago
Net-Fli: On-the-fly Compression, Archiving and Indexing of Streaming Network Traffic
The ever-increasing number of intrusions in public and commercial networks has created the need for high-speed archival solutions that continuously store streaming network data to...
Francesco Fusco, Marc Ph. Stoecklin, Michail Vlach...
SIAMNUM
2010
95views more  SIAMNUM 2010»
14 years 4 months ago
Robust BDDC Preconditioners for Reissner-Mindlin Plate Bending Problems and MITC Elements
A Balancing Domain Decomposition Method by Constraints (BDDC) is constructed and analyzed for the Reissner-Mindlin plate bending problem discretized with MITC finite elements. This...
L. Beirão da Veiga, C. Chinosi, Carlo Lovad...
TIP
2010
160views more  TIP 2010»
14 years 4 months ago
Development and Optimization of Regularized Tomographic Reconstruction Algorithms Utilizing Equally-Sloped Tomography
We develop two new algorithms for tomographic reconstruction which incorporate the technique of equally-sloped tomography (EST) and allow for the optimized and flexible implementat...
Yu Mao, Benjamin P. Fahimian, Stanley Osher, Jianw...
TISSEC
2010
119views more  TISSEC 2010»
14 years 4 months ago
Storage-Based Intrusion Detection
Storage-based intrusion detection allows storage systems to transparently watch for suspicious activity. Storage systems are well-positioned to spot several common intruder action...
Adam G. Pennington, John Linwood Griffin, John S. ...
« Prev « First page 1882 / 1905 Last » Next »