Sciweavers

6770 search results - page 933 / 1354
» How GPUs Work
Sort
View
138
Voted
LISA
2001
15 years 6 months ago
ScanSSH: Scanning the Internet for SSH Servers
SSH is a widely used application that provides secure remote login. It uses strong cryptography to provide authentication and confidentiality. The IETF SecSH working group is deve...
Niels Provos, Peter Honeyman
GRAPHICSINTERFACE
2003
15 years 6 months ago
Portrait: Generating Personal Presentations
The rise of email and instant messaging as important tools in the professional workplace has created changes in how we communicate. One such change is that these media tend to red...
James Fogarty, Jodi Forlizzi, Scott E. Hudson
MC
2001
140views Computer Science» more  MC 2001»
15 years 6 months ago
Cooperative model production in systems design to support knowledge management
The computer support of cooperation and knowledge production across socially distributed activity systems has become an important topic in the context of the discourse on ,,knowle...
Christoph Clases
NIPS
2004
15 years 6 months ago
Assignment of Multiplicative Mixtures in Natural Images
In the analysis of natural images, Gaussian scale mixtures (GSM) have been used to account for the statistics of filter responses, and to inspire hierarchical cortical representat...
Odelia Schwartz, Terrence J. Sejnowski, Peter Daya...
NSDI
2004
15 years 6 months ago
Model Checking Large Network Protocol Implementations
Network protocols must work. The effects of protocol specification or implementation errors range from reduced performance, to security breaches, to bringing down entire networks....
Madanlal Musuvathi, Dawson R. Engler