Sciweavers

5962 search results - page 993 / 1193
» Working with Patterns and Code
Sort
View
PPL
2008
264views more  PPL 2008»
15 years 4 months ago
A Performance Evaluation of the Nehalem Quad-Core Processor for Scientific Computing
In this work we present an initial performance evaluation of Intel's latest, secondgeneration quad-core processor, Nehalem, and provide a comparison to first-generation AMD a...
Kevin J. Barker, Kei Davis, Adolfy Hoisie, Darren ...
IIE
2007
130views more  IIE 2007»
15 years 4 months ago
An Iterative Methodology for Teaching Object Oriented Concepts
Abstract thinking is a vital skill when learning computer science. Object technology and the concepts it is based upon make this skill even more crucial. However, previous research...
Irit Hadar, Ethan Hadar
PRL
2006
95views more  PRL 2006»
15 years 4 months ago
Evolving visual sonar: Depth from monocular images
To recover depth from images, the human visual system uses many monocular depth cues, which vision research has only begun to explore. Because a given image can have many possible...
Martin C. Martin
SIGCSE
2008
ACM
150views Education» more  SIGCSE 2008»
15 years 4 months ago
Backstop: a tool for debugging runtime errors
The errors that Java programmers are likely to encounter can roughly be categorized into three groups: compile-time (semantic and syntactic), logical, and runtime (exceptions). Wh...
Christian Murphy, Eunhee Kim, Gail E. Kaiser, Adam...
IJSN
2007
73views more  IJSN 2007»
15 years 4 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji