Sciweavers

10055 search results - page 1774 / 2011
» Structured programming using processes
Sort
View
IJHPCA
2002
101views more  IJHPCA 2002»
13 years 9 months ago
SCALA: A Performance System For Scalable Computing
Lack of effective performance-evaluation environments is a major barrier to the broader use of high performance computing. Conventional performance environments are based on profi...
Xian-He Sun, Thomas Fahringer, Mario Pantano
PVLDB
2008
136views more  PVLDB 2008»
13 years 9 months ago
Keyword query cleaning
Unlike traditional database queries, keyword queries do not adhere to predefined syntax and are often dirty with irrelevant words from natural languages. This makes accurate and e...
Ken Q. Pu, Xiaohui Yu
ICRA
2010
IEEE
157views Robotics» more  ICRA 2010»
13 years 8 months ago
Integrated planning and control of large tracked vehicles in open terrain
Abstract— Trajectory generation and control of large equipment in open field environments involves systematically and robustly operating in uncertain and dynamic terrain. This p...
Xiuyi Fan, Surya Singh, Florian Oppolzer, Eric Net...
KBSE
2010
IEEE
13 years 8 months ago
RESISTing reliability degradation through proactive reconfiguration
Situated software systems are an emerging class of systems that are predominantly pervasive, embedded, and mobile. They are marked with a high degree of unpredictability and dynam...
Deshan Cooray, Sam Malek, Roshanak Roshandel, Davi...
SEKE
2010
Springer
13 years 8 months ago
A String Constraint Solver for Detecting Web Application Vulnerability
Given the bytecode of a software system, is it possible to automatically generate attack signatures that reveal its vulnerabilities? A natural solution would be symbolically execu...
Xiang Fu, Chung-Chih Li
« Prev « First page 1774 / 2011 Last » Next »