Sciweavers

6960 search results - page 1329 / 1392
» Continuity Analysis of Programs
Sort
View
COMPGEOM
2003
ACM
15 years 3 months ago
Cache-oblivious data structures for orthogonal range searching
We develop cache-oblivious data structures for orthogonal range searching, the problem of finding all T points in a set of N points in Êd lying in a query hyper-rectangle. Cache...
Pankaj K. Agarwal, Lars Arge, Andrew Danner, Bryan...
ISLPED
2003
ACM
197views Hardware» more  ISLPED 2003»
15 years 3 months ago
Analyzing the energy consumption of security protocols
Security is critical to a wide range of wireless data applications and services. While several security mechanisms and protocols have been developed in the context of the wired In...
Nachiketh R. Potlapally, Srivaths Ravi, Anand Ragh...
ICPPW
2002
IEEE
15 years 2 months ago
SNOW: Software Systems for Process Migration in High-Performance, Heterogeneous Distributed Environments
This paper reports our experiences on the Scalable Network Of Workstation (SNOW) project, which implements a novel methodology to support user-level process migration for traditio...
Kasidit Chanchio, Xian-He Sun
SIGMOD
2010
ACM
250views Database» more  SIGMOD 2010»
15 years 2 months ago
Spreadsheet as a relational database engine
Spreadsheets are among the most commonly used applications for data management and analysis. Perhaps they are even among the most widely used computer applications of all kinds. H...
Jerzy Tyszkiewicz
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
« Prev « First page 1329 / 1392 Last » Next »