Sciweavers

2913 search results - page 315 / 583
» How Much to Copy
Sort
View

Publication
1147views
17 years 2 months ago
PDE-based fast local level set method
We develop a fast method to localize the level set method of Osher and Sethian (1988, Journal of Computational Physics) and address two important issues that are intrinsic to the l...
Danping Peng, Barry Merriman, Stanley Osher, Hongk...
IJSN
2007
73views more  IJSN 2007»
15 years 3 months ago
Optimal worm-scanning method using vulnerable-host distributions
: Most Internet worms use random scanning. The distribution of vulnerable hosts on the Internet, however, is highly non-uniform over the IP-address space. This implies that random ...
Zesheng Chen, Chuanyi Ji
TC
2008
15 years 3 months ago
Implementing Synchronous Models on Loosely Time Triggered Architectures
Synchronous systems offer clean semantics and an easy verification path at the expense of often inefficient implementations. Capturing design specifications as synchronous models a...
Stavros Tripakis, Claudio Pinello, Albert Benvenis...
CE
2004
153views more  CE 2004»
15 years 3 months ago
Let's get physical: The learning benefits of interacting in digitally augmented physical spaces
Much computer-based learning is largely passive, based primarily on task-based, exercise-driven interactions. We argue that computers have greater potential for promoting more act...
Sara Price, Yvonne Rogers
113
Voted
COMPUTER
2004
120views more  COMPUTER 2004»
15 years 3 months ago
Computer Security in the Real World
After thirty years of work on computer security, why are almost all the systems in service today extremely vulnerable to attack? The main reason is that security is expensive to s...
Butler W. Lampson