Sciweavers

663 search results - page 43 / 133
» Evaluating the effectiveness of a new instructional approach
Sort
View
CCS
2005
ACM
14 years 1 months ago
Fast and automated generation of attack signatures: a basis for building self-protecting servers
Large-scale attacks, such as those launched by worms and zombie farms, pose a serious threat to our network-centric society. Existing approaches such as software patches are simpl...
Zhenkai Liang, R. Sekar
VISUALIZATION
1995
IEEE
13 years 11 months ago
An Integrated Approach for Steering, Visualization, and Analysis of Atmospheric Simulations
In the research described here, we have constructed at tightly coupled set of methods for monitoring, steering, and applying visual analysis to large scale simulations. This work ...
Yves Jean, Thomas Kindler, William Ribarsky, Weimi...
EUROSYS
2010
ACM
14 years 4 months ago
Splitter: A Proxy-based Approach for Post-Migration Testing of Web Applications
The benefits of virtualized IT environments, such as compute clouds, have drawn interested enterprises to migrate their applications onto new platforms to gain the advantages of ...
Xiaoning Ding, Hai Huang, Yaoping Ruan, Anees Shai...
JUCS
2006
112views more  JUCS 2006»
13 years 7 months ago
A Multi-objective Genetic Approach to Mapping Problem on Network-on-Chip
Abstract: Advances in technology now make it possible to integrate hundreds of cores (e.g. general or special purpose processors, embedded memories, application specific components...
Giuseppe Ascia, Vincenzo Catania, Maurizio Palesi
MAMMO
2010
Springer
13 years 6 months ago
Classifying Breast Masses in Volumetric Whole Breast Ultrasound Data: A 2.5-Dimensional Approach
The aim of this paper is to investigate a 2.5-dimensional approach in classifying masses as benign or malignant in volumetric anisotropic voxel whole breast ultrasound data. In thi...
Gobert N. Lee, Toshiaki Okada, Daisuke Fukuoka, Ch...