Sciweavers

1445 search results - page 179 / 289
» Architectures to make Simple Visualisations using Simple Sys...
Sort
View
146
Voted
CASCON
2004
129views Education» more  CASCON 2004»
15 years 4 months ago
Practical language-independent detection of near-miss clones
Previous research shows that most software systems contain significant amounts of duplicated, or cloned, code. Some clones are exact duplicates of each other, while others differ ...
James R. Cordy, Thomas R. Dean, Nikita Synytskyy
88
Voted
COLING
1990
15 years 3 months ago
Corpus Work With PC Beta
ct. PC Beta is a PC oriented tool for corpus work in this term's broadest possible sense. With PC Beta one can prepare texts for corpus work, e.g. standardize texts in differe...
Benny Brodda
USENIX
2007
15 years 4 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
128
Voted
CCGRID
2009
IEEE
15 years 9 months ago
The Eucalyptus Open-Source Cloud-Computing System
Cloud computing systems fundamentally provide access to large pools of data and computational resources through a variety of interfaces similar in spirit to existing grid and HPC ...
Daniel Nurmi, Richard Wolski, Chris Grzegorczyk, G...
130
Voted
RTSS
2003
IEEE
15 years 7 months ago
Adaptive Coherency Maintenance Techniques for Time-Varying Data
Often, data used in on-line decision making (for example, in determining how to react to changes in process behavior, traffic flow control, etc.) is dynamic in nature and hence ...
Ratul kr. Majumdar, Kannan M. Moudgalya, Krithi Ra...