Sciweavers

8874 search results - page 1669 / 1775
» A New Implementation of Automath
Sort
View
140
Voted
GCC
2003
Springer
15 years 8 months ago
Constructing Secure Web Service Based on XML
The paper discusses XML security key technologies related with security of Web service. Based on these discussions, Web service is integrated with some mature security architecture...
Shaomin Zhang, Baoyi Wang, Lihua Zhou
115
Voted
GECCO
2003
Springer
112views Optimization» more  GECCO 2003»
15 years 8 months ago
Limits in Long Path Learning with XCS
The development of the XCS Learning Classifier System [26] has produced a stable implementation, able to consistently identify the accurate and optimally general population of cla...
Alwyn Barry
140
Voted
GIS
2003
ACM
15 years 8 months ago
Construction of the planar partition postal code map based on cadastral reGIStration
Accurate postal code maps have many applications within GIS as the postal code has the potential to link the address description of buildings to their location in a specified glob...
Friso Penninga, Edward Verbree, Wilko Quak, Peter ...
123
Voted
ISCA
2010
IEEE
239views Hardware» more  ISCA 2010»
15 years 8 months ago
Sentry: light-weight auxiliary memory access control
Light-weight, flexible access control, which allows software to regulate reads and writes to any granularity of memory region, can help improve the reliability of today’s multi...
Arrvindh Shriraman, Sandhya Dwarkadas
148
Voted
PLDI
2010
ACM
15 years 8 months ago
Finding low-utility data structures
Many opportunities for easy, big-win, program optimizations are missed by compilers. This is especially true in highly layered Java applications. Often at the heart of these misse...
Guoqing Xu, Nick Mitchell, Matthew Arnold, Atanas ...
« Prev « First page 1669 / 1775 Last » Next »