Sciweavers

2799 search results - page 399 / 560
» computing 1998
Sort
View
PADS
1998
ACM
15 years 9 months ago
Fault-Tolerant Distributed Simulation
In traditional distributed simulation schemes, entire simulation needs to be restarted if any of the participating LP crashes. This is highly undesirable for long running simulati...
Om P. Damani, Vijay K. Garg
SIGCSE
1998
ACM
125views Education» more  SIGCSE 1998»
15 years 9 months ago
Design patterns: an essential component of CS curricula
The field of software patterns has seen an explosion in interest in the last three years. Work to date has been on the recognition, cataloging, and finding of patterns with litt...
Owen L. Astrachan, W. Garrett Mitchener, Geoffrey ...
KDD
1998
ACM
170views Data Mining» more  KDD 1998»
15 years 9 months ago
Mining Audit Data to Build Intrusion Detection Models
In this paper we discuss a data mining framework for constructing intrusion detection models. The key ideas are to mine system audit data for consistent and useful patterns of pro...
Wenke Lee, Salvatore J. Stolfo, Kui W. Mok
PKC
1998
Springer
123views Cryptology» more  PKC 1998»
15 years 8 months ago
Two Efficient Algorithms for Arithmetic of Elliptic Curves Using Frobenius Map
In this paper, we present two efficient algorithms computing scalar multiplications of a point in an elliptic curve defined over a small finite field, the Frobenius map of which ha...
Jung Hee Cheon, Sung-Mo Park, Sangwoo Park, Daeho ...
WADT
1998
Springer
15 years 8 months ago
An Algebra of Graph Derivations Using Finite (co-) Limit Double Theories
Graph transformation systems have been introduced for the formal specification of software systems. States are thereby modeled as graphs, and computations as graph derivations acco...
Andrea Corradini, Martin Große-Rhode, Reiko ...