Sciweavers

7924 search results - page 1504 / 1585
» Non-Malleable Functions and Their Applications
Sort
View
KBSE
2005
IEEE
14 years 2 months ago
Designing and implementing a family of intrusion detection systems
Intrusion detection systems are distributed applications that analyze the events in a networked system to identify malicious behavior. The analysis is performed using a number of ...
Richard A. Kemmerer
METRICS
2005
IEEE
14 years 2 months ago
Metrics of Software Architecture Changes Based on Structural Distance
Software architecture is an important form of abstraction, representing the overall system structure and the relationship among components. When software is modified from one ver...
Taiga Nakamura, Victor R. Basili
MICRO
2005
IEEE
130views Hardware» more  MICRO 2005»
14 years 2 months ago
Exploiting Vector Parallelism in Software Pipelined Loops
An emerging trend in processor design is the addition of short vector instructions to general-purpose and embedded ISAs. Frequently, these extensions are employed using traditiona...
Samuel Larsen, Rodric M. Rabbah, Saman P. Amarasin...
SSDBM
2005
IEEE
99views Database» more  SSDBM 2005»
14 years 2 months ago
Incorporating Semantics in Scientific Workflow Authoring
The tools used to analyze scientific data are often distinct from those used to archive, retrieve, and query data. A scientific workflow environment, however, allows one to seamles...
Chad Berkley, Shawn Bowers, Matthew B. Jones, Bert...
TPHOL
2005
IEEE
14 years 2 months ago
A HOL Theory of Euclidean Space
We describe a formalization of the elementary algebra, topology and analysis of finite-dimensional Euclidean space in the HOL Light theorem prover. (Euclidean space is RN with the...
John Harrison
« Prev « First page 1504 / 1585 Last » Next »