Sciweavers

7580 search results - page 1448 / 1516
» Prometheus design tool
Sort
View
PPAM
2007
Springer
15 years 10 months ago
Enhancing Productivity in High Performance Computing through Systematic Conditioning
Abstract. In order to take full advantage of high-end computing platforms, scientific applications often require modifications to source codes, and to their build systems that ge...
Magdalena Slawiñska, Jaroslaw Slawinski, Va...
CGO
2006
IEEE
15 years 10 months ago
BIRD: Binary Interpretation using Runtime Disassembly
The majority of security vulnerabilities published in the literature are due to software bugs. Many researchers have developed program transformation and analysis techniques to au...
Susanta Nanda, Wei Li, Lap-Chung Lam, Tzi-cker Chi...
INFOCOM
2006
IEEE
15 years 10 months ago
Optimal Distributed Detection in Clustered Wireless Sensor Networks: The Weighted Median
− In a clustered, multi-hop sensor network, a large number of inexpensive, geographically-distributed sensor nodes each use their observations of the environment to make local ha...
Qingjiang Tian, Edward J. Coyle
HT
2006
ACM
15 years 10 months ago
HT06, tagging paper, taxonomy, Flickr, academic article, to read
In recent years, tagging systems have become increasingly popular. These systems enable users to add keywords (i.e., “tags”) to Internet resources (e.g., web pages, images, vi...
Cameron Marlow, Mor Naaman, Danah Boyd, Marc Davis
MINENET
2006
ACM
15 years 10 months ago
SC2D: an alternative to trace anonymization
Progress in networking research depends crucially on applying novel analysis tools to real-world traces of network activity. This often conflicts with privacy and security requir...
Jeffrey C. Mogul, Martin F. Arlitt
« Prev « First page 1448 / 1516 Last » Next »