Sciweavers

988 search results - page 34 / 198
» The Frontiers of Data Programmability
Sort
View
98
Voted
MSS
2005
IEEE
84views Hardware» more  MSS 2005»
15 years 6 months ago
Storage-Based Intrusion Detection for Storage Area Networks (SANs)
Storage systems are the next frontier for providing protection against intrusion. Since storage systems see changes to persistent data, several types of intrusions can be detected...
Mohammad Banikazemi, Dan E. Poff, Bülent Abal...
118
Voted
JDCTA
2010
347views more  JDCTA 2010»
14 years 7 months ago
Application of 3D body scanning technology to human measurement for clothing Fit
Complications with garment sizing and poor fit inconvenience many consumers who become dissatisfied with such provision on the high street. It is evident that human measurement an...
Phoebe R. Apeagyei
AFP
2004
Springer
128views Formal Methods» more  AFP 2004»
15 years 6 months ago
GEC: A Toolkit for Generic Rapid Prototyping of Type Safe Interactive Applications
Abstract. Programming GUIs with conventional GUI APIs is notoriously tedious. In these notes we present the GEC toolkit in which the programmer can create user interfaces without a...
Peter Achten, Marko C. J. D. van Eekelen, Rinus Pl...
130
Voted
TOOLS
1998
IEEE
15 years 4 months ago
Macro Processing in Object-Oriented Languages
There are a number of programmable macro systems such as Lisp's. While they can handle complex program transformation, they still have difficulty in handling some kinds of tr...
Shigeru Chiba
MCMASTER
1993
15 years 4 months ago
A Systolizing Compilation Scheme for Nested Loops with Linear Bounds
With the recent advances in massively parallel programmable processor networks, methods for the infusion of massive MIMD parallelism into programs have become increasingly relevant...
Michael Barnett, Christian Lengauer