Sciweavers

450 search results - page 86 / 90
» Experience with an analytic approach to teaching programming...
Sort
View
ASPLOS
2009
ACM
15 years 10 months ago
StreamRay: a stream filtering architecture for coherent ray tracing
The wide availability of commodity graphics processors has made real-time graphics an intrinsic component of the human/computer interface. These graphics cores accelerate the z-bu...
Karthik Ramani, Christiaan P. Gribble, Al Davis
UM
2009
Springer
15 years 4 months ago
PerspectiveSpace: Opinion Modeling with Dimensionality Reduction
Abstract. Words mean different things to different people, and capturing these differences is often a subtle art. These differences are often “a matter of perspective,” and...
Jason B. Alonso, Catherine Havasi, Henry Lieberman
80
Voted
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
15 years 3 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...
KBSE
2005
IEEE
15 years 3 months ago
Testing in resource constrained execution environments
Software for resource constrained embedded devices is often implemented in the Java programming language because the Java compiler and virtual machine provide enhanced safety, por...
Gregory M. Kapfhammer, Mary Lou Soffa, Daniel Moss...
ISLPED
2005
ACM
93views Hardware» more  ISLPED 2005»
15 years 3 months ago
Power-aware code scheduling for clusters of active disks
In this paper, we take the idea of application-level processing on disks to one level further, and focus on an architecture, called Cluster of Active Disks (CAD), where the storag...
Seung Woo Son, Guangyu Chen, Mahmut T. Kandemir