Sciweavers

190 search results - page 26 / 38
» Can Programming Be Liberated, Period
Sort
View
CORR
2010
Springer
151views Education» more  CORR 2010»
13 years 7 months ago
Behavioural Correlation for Detecting P2P Bots
In the past few years, IRC bots, malicious programs which are remotely controlled by the attacker through IRC servers, have become a major threat to the Internet and users. These ...
Yousof Al-Hammadi, Uwe Aickelin
KI
2006
Springer
13 years 7 months ago
GeTS - A Specification Language for Geo-Temporal Notions
This document describes the `Geo-Temporal' specification language GeTS. The objects which can be described and manipulated with this language are time points, crisp and fuzzy...
Hans Jürgen Ohlbach
KBS
2007
101views more  KBS 2007»
13 years 7 months ago
A Knowledge Base for the maintenance of knowledge extracted from web data
By applying web mining tools, significant patterns about the visitor behavior can be extracted from data originated in web sites. Supported by a domain expert, the patterns are v...
Juan D. Velásquez, Vasile Palade
SOFTVIS
2010
ACM
13 years 7 months ago
AllocRay: memory allocation visualization for unmanaged languages
A programs memory system performance is one of the key determinants of its overall performance. Lack of understanding of a programs memory system behavior can lead to performance ...
George G. Robertson, Trishul M. Chilimbi, Bongshin...
IPPS
2006
IEEE
14 years 1 months ago
Algorithm-based checkpoint-free fault tolerance for parallel matrix computations on volatile resources
As the desire of scientists to perform ever larger computations drives the size of today’s high performance computers from hundreds, to thousands, and even tens of thousands of ...
Zizhong Chen, Jack Dongarra