Sciweavers

4172 search results - page 693 / 835
» Computing Machinery and Understanding
Sort
View
125
Voted
ITNG
2008
IEEE
15 years 10 months ago
Hierarchy-Driven Approach for Attack Patterns in Software Security Education
We propose a hierarchy-driven approach to facilitate student learning and foster a deeper understanding of the importance of attack patterns in computer, network, and software sec...
Joshua J. Pauli, Patrick Henry Engebretson
123
Voted
ICCV
2007
IEEE
15 years 9 months ago
Motion Analysis of Endovascular Stent-Grafts by MDL Based Registration
The endovascular repair of a traumatic rupture of the thoracic aorta - that would otherwise lead to the death of the patient - is performed by delivering a stent-graft into the ve...
Georg Langs, Nikos Paragios, Rene Donner, Pascal D...
IPPS
2007
IEEE
15 years 9 months ago
Experience of Optimizing FFT on Intel Architectures
Automatic library generators, such as ATLAS [11], Spiral [8] and FFTW [2], are promising technologies to generate efficient code for different computer architectures. The library...
Daniel Orozco, Liping Xue, Murat Bolat, Xiaoming L...
156
Voted
IPPS
2007
IEEE
15 years 9 months ago
An Adaptive Semantic Filter for Blue Gene/L Failure Log Analysis
— Frequent failure occurrences are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in ...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
158
Voted
CSCWD
2007
Springer
15 years 9 months ago
An Integration Life Cycle for Semantic Web Services Composition
Business applications are more and more often developed on the basis of Web services. The aim is to provide platform independence and loose coupling between business applications ...
Muhammad Ahtisham Aslam, Jun Shen, Sören Auer...