Sciweavers

343 search results - page 30 / 69
» Purely Relational FLWORs
Sort
View
VRST
2006
ACM
14 years 1 months ago
Utilizing jump flooding in image-based soft shadows
This paper studies the usage of the GPU as a collection of groups of related processing units, where each group communicates in some way to complete a computation efficiently and...
Guodong Rong, Tiow Seng Tan
SADFE
2005
IEEE
14 years 1 months ago
SecSyslog: an Approach to Secure Logging Based on Covert Channels
Today log traces are widely used to identify and prevent violations of corporate information systems. The most recent logging trend is to manage most level 3 ISO/OSI traffic via p...
Dario V. Forte, Cristiano Maruti, Michele R. Vettu...
SP
2005
IEEE
131views Security Privacy» more  SP 2005»
14 years 1 months ago
Semantics-Aware Malware Detection
A malware detector is a system that attempts to determine whether a program has malicious intent. In order to evade detection, malware writers (hackers) frequently use obfuscation...
Mihai Christodorescu, Somesh Jha, Sanjit A. Seshia...
MLCW
2005
Springer
14 years 1 months ago
Recognizing Textual Entailment Via Atomic Propositions
Abstract. This paper describes Macquarie University’s Centre for Language Technology contribution to the PASCAL 2005 Recognizing Textual Entailment challenge. Our main aim was to...
Elena Akhmatova, Diego Mollá
WABI
2005
Springer
108views Bioinformatics» more  WABI 2005»
14 years 1 months ago
On the Complexity of Several Haplotyping Problems
We present several new results pertaining to haplotyping. The first set of results concerns the combinatorial problem of reconstructing haplotypes from incomplete and/or imperfect...
Rudi Cilibrasi, Leo van Iersel, Steven Kelk, John ...