Sciweavers

13895 search results - page 2539 / 2779
» Exploring
Sort
View
89
Voted
KDD
1998
ACM
140views Data Mining» more  KDD 1998»
15 years 5 months ago
Blurring the Distinction between Command and Data in Scientific KDD
We have been working on two different KDD systems for scientific data. One system involves comparative genomics, where the database contains more than 60,000 plant gene and protei...
John V. Carlis, Elizabeth Shoop, Scott Krieger
107
Voted
HOTOS
1997
IEEE
15 years 5 months ago
Security for Extensible Systems
The recent trend towards dynamically extensible systems, such as Java, SPIN or VINO, promises more powerful and flexible systems. At the same time, the impact of extensibility on...
Robert Grimm, Brian N. Bershad
MAS
1998
Springer
145views Communications» more  MAS 1998»
15 years 5 months ago
Language Issues in Mobile Program Security
Abstract. Many programming languages have been developed and implemented for mobile code environments. They are typically quite expressive. But while security is an important aspec...
Dennis M. Volpano, Geoffrey Smith
ICCAD
1997
IEEE
108views Hardware» more  ICCAD 1997»
15 years 5 months ago
Negative thinking by incremental problem solving: application to unate covering
We introduce a new technique to solve exactly a discrete optimization problem, based on the paradigm of “negative” thinking. The motivation is that when searching the space of...
Evguenii I. Goldberg, Luca P. Carloni, Tiziano Vil...
ISCA
1997
IEEE
135views Hardware» more  ISCA 1997»
15 years 5 months ago
The Design and Analysis of a Cache Architecture for Texture Mapping
The effectiveness of texture mapping in enhancing the realism of computer generated imagery has made support for real-time texture mapping a critical part of graphics pipelines. D...
Ziyad S. Hakura, Anoop Gupta
« Prev « First page 2539 / 2779 Last » Next »