Sciweavers

1406 search results - page 236 / 282
» Similarity in Programs
Sort
View
NSPW
2003
ACM
15 years 3 months ago
SELF: a transparent security extension for ELF binaries
The ability to analyze and modify binaries is often very useful from a security viewpoint. Security operations one would like to perform on binaries include the ability to extract...
Daniel C. DuVarney, V. N. Venkatakrishnan, Sandeep...
CCGRID
2009
IEEE
15 years 4 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
ISCA
2007
IEEE
146views Hardware» more  ISCA 2007»
15 years 4 months ago
Hardware atomicity for reliable software speculation
Speculative compiler optimizations are effective in improving both single-thread performance and reducing power consumption, but their implementation introduces significant compl...
Naveen Neelakantam, Ravi Rajwar, Suresh Srinivas, ...
INTERACT
2007
14 years 11 months ago
CubeExplorer: An Evaluation of Interaction Techniques in Architectural Education
During the early stages of architectural training, tangibility plays an important role in developing spatial awareness. In such contexts, tangible user interfaces are believed to p...
Hyunyoung Song, François Guimbretièr...
KDD
2004
ACM
213views Data Mining» more  KDD 2004»
15 years 3 months ago
Analytical view of business data
This paper describes a logical extension to Microsoft Business Framework (MBF) called Analytical View (AV). AV consists of three components: Model Service for design time, Busines...
Adam Yeh, Jonathan Tang, Youxuan Jin, Sam Skrivan