Sciweavers

20175 search results - page 3816 / 4035
» Is abstraction the key to computing
Sort
View
126
Voted
IIE
2007
85views more  IIE 2007»
15 years 21 days ago
Half-Baked Logo Microworlds as Boundary Objects in Integrated Design
The paper addresses the problem of fragmentation of the communities involved in the design of digital media for education. It draws on the experience gained at the Educational Tec...
Chronis Kynigos
106
Voted
SIAMSC
2008
131views more  SIAMSC 2008»
15 years 20 days ago
Fast Monte Carlo Simulation Methods for Biological Reaction-Diffusion Systems in Solution and on Surfaces
Many important physiological processes operate at time and space scales far beyond those accessible to atom-realistic simulations, and yet discrete stochastic rather than continuum...
Rex A. Kerr, Thomas M. Bartol, Boris Kaminsky, Mar...
107
Voted
SIGARCH
2008
94views more  SIGARCH 2008»
15 years 20 days ago
Parallelization, performance analysis, and algorithm consideration of Hough transform on chip multiprocessors
This paper presents a parallelization framework for emerging applications on the future chip multiprocessors (CMPs). With the continuing prevalence of CMP and the number of on-die...
Wenlong Li, Yen-Kuang Chen
105
Voted
SIGMETRICS
2008
ACM
140views Hardware» more  SIGMETRICS 2008»
15 years 20 days ago
Scalable VPN routing via relaying
Enterprise customers are increasingly adopting MPLS (Multiprotocol Label Switching) VPN (Virtual Private Network) service that offers direct any-to-any reachability among the cust...
Changhoon Kim, Alexandre Gerber, Carsten Lund, Dan...
IJNSEC
2007
125views more  IJNSEC 2007»
15 years 20 days ago
An Observation-Centric Analysis on the Modeling of Anomaly-based Intrusion Detection
It is generally agreed that two key points always attract special concerns during the modelling of anomaly-based intrusion detection. One is the techniques about discerning two cl...
Zonghua Zhang, Hong Shen, Yingpeng Sang
« Prev « First page 3816 / 4035 Last » Next »