Sciweavers

1893 search results - page 156 / 379
» Computational composites
Sort
View
135
Voted
AIM
2002
15 years 21 days ago
Computational Vulnerability Analysis for Information Survivability
The Infrastructure of modern society is controlled by software systems. These systems are vulnerable to attacks; several such attacks, launched by "recreation hackers" h...
Howard E. Shrobe
125
Voted
MIDDLEWARE
2004
Springer
15 years 6 months ago
Toward a standard ubiquitous computing framework
This paper surveys a variety of subsystems designed to be the building blocks from which sophisticated infrastructures for ubiquitous computing are assembled. Our experience shows...
Martin Modahl, Bikash Agarwalla, Gregory D. Abowd,...
WWW
2004
ACM
16 years 1 months ago
QoS computation and policing in dynamic web service selection
The emerging Service-Oriented Computing (SOC) paradigm promises to enable businesses and organizations to collaborate in an unprecedented way by means of standard web services. To...
Yutu Liu, Anne H. H. Ngu, Liangzhao Zeng
92
Voted
IPPS
2009
IEEE
15 years 7 months ago
High-order stencil computations on multicore clusters
Stencil computation (SC) is of critical importance for broad scientific and engineering applications. However, it is a challenge to optimize complex, highorder SC on emerging clus...
Liu Peng, Richard Seymour, Ken-ichi Nomura, Rajiv ...
118
Voted
CORR
2007
Springer
173views Education» more  CORR 2007»
15 years 24 days ago
Computing modular polynomials in quasi-linear time
We analyse and compare the complexity of several algorithms for computing modular polynomials. We show that an algorithm relying on floating point evaluation of modular functions...
Andreas Enge