Sciweavers

13752 search results - page 2587 / 2751
» Parallel and Distributed Haskells
Sort
View
151
Voted
HPCC
2005
Springer
15 years 9 months ago
Efficient SIMD Numerical Interpolation
This paper reports the results of SIMD implementation of a number of interpolation algorithms on common personal computers. These methods fit a curve on some given input points for...
Hossein Ahmadi, Maryam Moslemi Naeini, Hamid Sarba...
NSPW
2004
ACM
15 years 9 months ago
Towards agile security assurance
Agile development methodologies are gaining acceptance in the software industry. If they are to be used for constructing securitycritical solutions, what do we do about assurance?...
Konstantin Beznosov, Philippe Kruchten
108
Voted
NSPW
2004
ACM
15 years 9 months ago
The user non-acceptance paradigm: INFOSEC's dirty little secret
(by Victor Raskin) This panel will address users’ perceptions and misperceptions of the risk/benefit and benefit/nuisance ratios associated with information security products, an...
Steven J. Greenwald, Kenneth G. Olthoff, Victor Ra...
106
Voted
NSPW
2004
ACM
15 years 9 months ago
The role of suspicion in model-based intrusion detection
We argue in favor of the explicit inclusion of suspicion as a concrete concept to be used in the analysis of audit data in order to guide the search for evidence of misuse. Our ap...
Timothy Hollebeek, Rand Waltzman
SC
2004
ACM
15 years 9 months ago
Language and Compiler Support for Adaptive Applications
There exist many application classes for which the users have significant flexibility in the quality of output they desire. At the same time, there are other constraints, such a...
Wei Du, Gagan Agrawal
« Prev « First page 2587 / 2751 Last » Next »