Sciweavers

1014 search results - page 202 / 203
» Software Development Environments for Scientific and Enginee...
Sort
View
SIGMOD
2009
ACM
197views Database» more  SIGMOD 2009»
14 years 7 months ago
Secure kNN computation on encrypted databases
Service providers like Google and Amazon are moving into the SaaS (Software as a Service) business. They turn their huge infrastructure into a cloud-computing environment and aggr...
Wai Kit Wong, David Wai-Lok Cheung, Ben Kao, Nikos...
ISW
2009
Springer
14 years 2 months ago
Automated Spyware Collection and Analysis
Various online studies on the prevalence of spyware attest overwhelming numbers (up to 80%) of infected home computers. However, the term spyware is ambiguous and can refer to anyt...
Andreas Stamminger, Christopher Kruegel, Giovanni ...
TASLP
2010
167views more  TASLP 2010»
13 years 2 months ago
Broadband Source Localization From an Eigenanalysis Perspective
Abstract--Broadband source localization has several applications ranging from automatic video camera steering to target signal tracking and enhancement through beamforming. Consequ...
Mehrez Souden, Jacob Benesty, Sofiène Affes
PLDI
2011
ACM
12 years 10 months ago
Finding and understanding bugs in C compilers
Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bug...
Xuejun Yang, Yang Chen, Eric Eide, John Regehr
ISORC
2005
IEEE
14 years 1 months ago
Heterogeneous Adaptive Component-Based Applications with Adaptive.Net
Adaptation to changing environmental conditions is a major challenge for most distributed applications. The service-oriented programming paradigm leads to an increasing number of ...
Andreas Rasche, Marco Puhlmann, Andreas Polze