Sciweavers

14161 search results - page 2727 / 2833
» On generalized middle-level problem
Sort
View
CCS
2007
ACM
15 years 8 months ago
Analyzing network traffic to detect self-decrypting exploit code
Remotely-launched software exploits are a common way for attackers to intrude into vulnerable computer systems. As detection techniques improve, remote exploitation techniques are...
Qinghua Zhang, Douglas S. Reeves, Peng Ning, S. Pu...
ITICSE
2010
ACM
15 years 8 months ago
Experience report: CS1 for majors with media computation
Previous reports of a media computation approach to teaching programming have either focused on pre-CS1 courses or courses for non-majors. We report the adoption of a media comput...
Beth Simon, Päivi Kinnunen, Leo Porter, Dov Z...
CF
2007
ACM
15 years 8 months ago
Parallel genomic sequence-search on a massively parallel system
In the life sciences, genomic databases for sequence search have been growing exponentially in size. As a result, faster sequencesearch algorithms to search these databases contin...
Oystein Thorsen, Brian E. Smith, Carlos P. Sosa, K...
CIKM
2007
Springer
15 years 8 months ago
A fast unified optimal route query evaluation algorithm
We investigate the problem of how to evaluate, fast and efficiently, classes of optimal route queries on a massive graph in a unified framework. To evaluate a route query effectiv...
Edward P. F. Chan, Jie Zhang
AOSD
2009
ACM
15 years 8 months ago
Semantic vs. syntactic compositions in aspect-oriented requirements engineering: an empirical study
Most current aspect composition mechanisms rely on syntactic references to the base modules or wildcard mechanisms quantifying over such syntactic references in pointcut expressio...
Ruzanna Chitchyan, Phil Greenwood, Américo ...
« Prev « First page 2727 / 2833 Last » Next »