Sciweavers

2127 search results - page 381 / 426
» Software Automation
Sort
View
CN
2007
137views more  CN 2007»
13 years 9 months ago
Defending against hitlist worms using network address space randomization
Worms are self-replicating malicious programs that represent a major security threat for the Internet, as they can infect and damage a large number of vulnerable hosts at timescal...
Spyros Antonatos, Periklis Akritidis, Evangelos P....
IPM
2008
155views more  IPM 2008»
13 years 9 months ago
Determining the informational, navigational, and transactional intent of Web queries
In this paper, we define and present a comprehensive classification of user intent for Web searching. The classification consists of three hierarchical levels of informational, na...
Bernard J. Jansen, Danielle L. Booth, Amanda Spink
CORR
2007
Springer
78views Education» more  CORR 2007»
13 years 9 months ago
Tag-Cloud Drawing: Algorithms for Cloud Visualization
Tag clouds provide an aggregate of tag-usage statistics. They are typically sent as in-line HTML to browsers. However, display mechanisms suited for ordinary text are not ideal fo...
Owen Kaser, Daniel Lemire
JUCS
2008
137views more  JUCS 2008»
13 years 9 months ago
CrossMDA: a Model-driven Approach for Aspect Management
: Nowadays, the complexity of software applications has brought new challenges to developers, having to deal with a large number of computational requirements. Among these requirem...
Marcelo Pitanga Alves, Paulo F. Pires, Fláv...
PC
2008
142views Management» more  PC 2008»
13 years 9 months ago
Performance analysis challenges and framework for high-performance reconfigurable computing
Reconfigurable computing (RC) applications employing both microprocessors and FPGAs have potential for large speedup when compared with traditional (software) parallel application...
Seth Koehler, John Curreri, Alan D. George