Sciweavers

7623 search results - page 1321 / 1525
» Constructive Volume Modeling
Sort
View
PODC
2010
ACM
15 years 7 months ago
Transactional predication: high-performance concurrent sets and maps for STM
Concurrent collection classes are widely used in multi-threaded programming, but they provide atomicity only for a fixed set of operations. Software transactional memory (STM) pr...
Nathan Grasso Bronson, Jared Casper, Hassan Chafi,...
SIGIR
2010
ACM
15 years 7 months ago
Linking wikipedia to the web
We investigate the task of finding links from Wikipedia pages to external web pages. Such external links significantly extend the information in Wikipedia with information from ...
Rianne Kaptein, Pavel Serdyukov, Jaap Kamps
ICANNGA
2007
Springer
100views Algorithms» more  ICANNGA 2007»
15 years 7 months ago
Softening Splits in Decision Trees Using Simulated Annealing
Predictions computed by a classification tree are usually constant on axis-parallel hyperrectangles corresponding to the leaves and have strict jumps on their boundaries. The densi...
Jakub Dvorák, Petr Savický
ICECCS
2007
IEEE
120views Hardware» more  ICECCS 2007»
15 years 7 months ago
Verifying the CICS File Control API with Z/Eves: An Experiment in the Verified Software Repository
Parts of the CICS transaction processing system were modelled formally in the 1980s in a collaborative project between IBM Hursley Park and Oxford University Computing Laboratory....
Leo Freitas, Konstantinos Mokos, Jim Woodcock
ACSAC
2004
IEEE
15 years 7 months ago
Automatic Generation and Analysis of NIDS Attacks
A common way to elude a signature-based NIDS is to transform an attack instance that the NIDS recognizes into another instance that it misses. For example, to avoid matching the a...
Shai Rubin, Somesh Jha, Barton P. Miller
« Prev « First page 1321 / 1525 Last » Next »