Sciweavers

1474 search results - page 153 / 295
» Exploiting Locality in a TMS
Sort
View
VIROLOGY
2008
95views more  VIROLOGY 2008»
15 years 4 months ago
On JavaScript Malware and related threats
The term JavaScript Malware describes attacks that abuse the web browser's capabilities to execute malicious script-code within the victim's local execution context. Unli...
Martin Johns
MP
2002
84views more  MP 2002»
15 years 4 months ago
A decomposition procedure based on approximate Newton directions
The efficient solution of large-scale linear and nonlinear optimization problems may require exploiting any special structure in them in an efficient manner. We describe and analy...
Antonio J. Conejo, Francisco J. Nogales, Francisco...
SIAMJO
2002
149views more  SIAMJO 2002»
15 years 4 months ago
Semidefinite Programs: New Search Directions, Smoothing-Type Methods, and Numerical Results
Motivated by some results for linear programs and complementarity problems, this paper gives some new characterizations of the central path conditions for semidefinite programs. Ex...
Christian Kanzow, Christian Nagel
CORR
2010
Springer
66views Education» more  CORR 2010»
15 years 3 months ago
Three-Level Parallel J-Jacobi Algorithms for Hermitian Matrices
The paper describes several efficient parallel implementations of the one-sided hyperbolic Jacobi-type algorithm for computing eigenvalues and eigenvectors of Hermitian matrices. ...
Sanja Singer, Sasa Singer, Vedran Novakovic, Davor...
PCM
2010
Springer
200views Multimedia» more  PCM 2010»
15 years 2 months ago
A New Shape Descriptor for Object Recognition and Retrieval
Abstract. We present a new shape descriptor for measuring the similarity between shapes and exploit it in graphical object recognition and retrieval. By statistically integrating t...
Feng Su, Tong Lu, Ruoyu Yang