Sciweavers

1469 search results - page 203 / 294
» Map operations and k-orbit maps
Sort
View
119
Voted
EUROPAR
2009
Springer
15 years 7 months ago
XJava: Exploiting Parallelism with Object-Oriented Stream Programming
Abstract. This paper presents the XJava compiler for parallel programs. It exploits parallelism based on an object-oriented stream programming paradigm. XJava extends Java with new...
Frank Otto, Victor Pankratius, Walter F. Tichy
ICICS
2009
Springer
15 years 7 months ago
Assessing Security Risk to a Network Using a Statistical Model of Attacker Community Competence
We propose a novel approach for statistical risk modeling of network attacks that lets an operator perform risk analysis using a data model and an impact model on top of an attack ...
Tomas Olsson
ISMIS
2009
Springer
15 years 7 months ago
Discovering Structured Event Logs from Unstructured Audit Trails for Workflow Mining
Workflow mining aims to find graph-based process models based on activities, emails, and various event logs recorded in computer systems. Current workflow mining techniques mainly ...
Liqiang Geng, Scott Buffett, Bruce Hamilton, Xin W...
114
Voted
SAMOS
2009
Springer
15 years 7 months ago
Experiences with Cell-BE and GPU for Tomography
Tomography is a powerful technique for three-dimensional imaging, that deals with image reconstruction from a series of projection images, acquired along a range of viewing directi...
Sander van der Maar, Kees Joost Batenburg, Jan Sij...
117
Voted
TLCA
2009
Springer
15 years 7 months ago
Algebraic Totality, towards Completeness
Finiteness spaces constitute a categorical model of Linear Logic whose objects can be seen as linearly topologised spaces, (a class of topological vector spaces introduced by Lefsc...
Christine Tasson