Sciweavers

1592 search results - page 214 / 319
» The state of the email address
Sort
View
PVM
2005
Springer
15 years 6 months ago
Cooperative Write-Behind Data Buffering for MPI I/O
Many large-scale production parallel programs often run for a very long time and require data checkpoint periodically to save the state of the computation for program restart and/o...
Wei-keng Liao, Kenin Coloma, Alok N. Choudhary, Le...
99
Voted
SOCO
2005
Springer
15 years 6 months ago
A Lambda Calculus with Forms
Abstract. The need to use position-dependent parameters often hamdefinition of flexible, extensible, and reusable abstractions for software composition. This observation has led ...
Markus Lumpe
80
Voted
SSD
2005
Springer
153views Database» more  SSD 2005»
15 years 6 months ago
Change Detection in Time Series Data Using Wavelet Footprints
In this paper, we propose a novel approach to address the problem of change detection in time series data. Our approach is based on wavelet footprints proposed originally by the si...
Mehdi Sharifzadeh, Farnaz Azmoodeh, Cyrus Shahabi
100
Voted
ICICS
2005
Springer
15 years 6 months ago
Network Vulnerability Analysis Through Vulnerability Take-Grant Model (VTG)
Modeling and analysis of information system vulnerabilities helps us to predict possible attacks to networks using the network configuration and vulnerabilities information. As a f...
Hamid Reza Shahriari, Reza Sadoddin, Rasool Jalili...
97
Voted
SIGSOFT
2004
ACM
15 years 6 months ago
Verifying aspect advice modularly
Aspect-oriented programming has become an increasingly important means of expressing cross-cutting program abstractions. Despite this, aspects lack support for computeraided veri...
Shriram Krishnamurthi, Kathi Fisler, Michael Green...