Sciweavers

5109 search results - page 1011 / 1022
» On Learning Limiting Programs
Sort
View
KDD
2009
ACM
181views Data Mining» more  KDD 2009»
15 years 2 months ago
Intelligent file scoring system for malware detection from the gray list
Currently, the most significant line of defense against malware is anti-virus products which focus on authenticating valid software from a white list, blocking invalid software f...
Yanfang Ye, Tao Li, Qingshan Jiang, Zhixue Han, Li...
OOPSLA
2009
Springer
15 years 2 months ago
Good examples for exposing bad practice: a "killer examples" workshop
The “Killer Examples” series of workshops are highly interactive workshops which have been an annual occurrence at OOPSLA since 2002. The goals of the workshop are to bring to...
Dale Skrien, Michael E. Caspersen, Jürgen B&o...
138
Voted
ICCS
2001
Springer
15 years 2 months ago
Developing Components and Curricula for a Research-Rich Undergraduate Degree in Computational Physics
Abstract. A four-year undergraduate curriculum leading to a Bachelor’s degree in Computational Physics is described. The courses, texts, and seminars are research- and Web-rich, ...
Rubin H. Landau
86
Voted
HPDC
2000
IEEE
15 years 1 months ago
Creating Large Scale Database Servers
The BaBar experiment at the Stanford Linear Accelerator Center (SLAC) is designed to perform a high precision investigation of the decays of the B-meson produced from electron-pos...
Jacek Becla, Andrew Hanushevsky
87
Voted
ISCA
2000
IEEE
121views Hardware» more  ISCA 2000»
15 years 1 months ago
Selective, accurate, and timely self-invalidation using last-touch prediction
Communication in cache-coherent distributed shared memory (DSM) often requires invalidating (or writing back) cached copies of a memory block, incurring high overheads. This paper...
An-Chow Lai, Babak Falsafi
« Prev « First page 1011 / 1022 Last » Next »