Sciweavers

2414 search results - page 368 / 483
» Computing Normal Subgroups
Sort
View
ICWS
2009
IEEE
15 years 7 months ago
Deactivation of Unwelcomed Deep Web Extraction Services through Random Injection
Websites serve content both through Web Services as well as through user-viewable webpages. While the consumers of web-services are typically ‘machines’, webpages are meant fo...
Varun Bhagwan, Tyrone Grandison
PADL
2010
Springer
15 years 6 months ago
An Ode to Arrows
Abstract. We study a number of embedded DSLs for autonomous ordinary differential equations (autonomous ODEs) in Haskell. A naive implementation based on the lazy tower of derivat...
Hai Liu, Paul Hudak
POPL
2009
ACM
15 years 4 months ago
Speculative N-Way barriers
Speculative execution is an important technique that has historically been used to extract concurrency from sequential programs. While techniques to support speculation work well ...
Lukasz Ziarek, Suresh Jagannathan, Matthew Fluet, ...
WWW
2009
ACM
15 years 4 months ago
A general framework for adaptive and online detection of web attacks
Detection of web attacks is an important issue in current defense-in-depth security framework. In this paper, we propose a novel general framework for adaptive and online detectio...
Wei Wang 0012, Florent Masseglia, Thomas Guyet, Re...
ICASSP
2009
IEEE
15 years 4 months ago
Subspace tracking of fast time-varying channels in precoded MIMO-OFDM systems
This paper presents a blind subspace-based tracking scheme for precoded MIMO-OFDM systems over rapidly time-varying wireless channels. Subspace-based tracking is normally consider...
Chao-Cheng Tu, Benoît Champagne