Sciweavers

6770 search results - page 311 / 1354
» How GPUs Work
Sort
View
CCS
2006
ACM
15 years 7 months ago
A scalable approach to attack graph generation
Attack graphs are important tools for analyzing security vulnerabilities in enterprise networks. Previous work on attack graphs has not provided an account of the scalability of t...
Xinming Ou, Wayne F. Boyer, Miles A. McQueen
SIGCOMM
2010
ACM
15 years 4 months ago
An analysis of social network-based Sybil defenses
Recently, there has been much excitement in the research community over using social networks to mitigate multiple identity, or Sybil, attacks. A number of schemes have been propo...
Bimal Viswanath, Ansley Post, P. Krishna Gummadi, ...
SOFTWARE
2008
15 years 4 months ago
What Do We Know about Developer Motivation?
s of titles and abstracts) as irrelevant to our focus. We read the remaining 519 papers in full to establish our final list. The 92 papers we chose were originally published in the...
Tracy Hall, Helen Sharp, Sarah Beecham, Nathan Bad...
SIAMSC
2010
130views more  SIAMSC 2010»
15 years 2 months ago
First-Order System Least Squares for Incompressible Resistive Magnetohydrodynamics
Magnetohydrodynamics (MHD) is a fluid theory that describes Plasma Physics by treating the plasma as a fluid of charged particles. Hence, the equations that describe the plasma f...
J. H. Adler, Thomas A. Manteuffel, Stephen F. McCo...
CVPR
2005
IEEE
16 years 6 months ago
Spatiograms versus Histograms for Region-Based Tracking
We introduce the concept of a spatiogram, which is a generalization of a histogram that includes potentially higher order moments. A histogram is a zeroth-order spatiogram, while ...
Stan Birchfield, Sriram Rangarajan