Sciweavers

353 search results - page 21 / 71
» The C Hackers Guide
Sort
View
SIGCSE
2010
ACM
183views Education» more  SIGCSE 2010»
14 years 5 months ago
Electronic commerce virtual laboratory
Website security is essential for successful e-commerce ventures, but the vital “how-to” components of security are often lacking in academic courses. This paper describes our...
Joel Coffman, Alfred C. Weaver
CBSE
2006
Springer
14 years 2 months ago
Verification of Component-Based Software Application Families
We present a novel approach which facilitates formal verification of component-based software application families using model checking. This approach enables effective composition...
Fei Xie, James C. Browne
ICCD
2006
IEEE
128views Hardware» more  ICCD 2006»
14 years 7 months ago
Polaris: A System-Level Roadmap for On-Chip Interconnection Networks
Technology trends are driving parallel on-chip architectures in the form of multi-processor systems-on-a-chip (MPSoCs) and chip multi-processors (CMPs). In these systems the incre...
Vassos Soteriou, Noel Eisley, Hangsheng Wang, Bin ...
IJCNN
2007
IEEE
14 years 5 months ago
Agnostic Learning versus Prior Knowledge in the Design of Kernel Machines
Abstract— The optimal model parameters of a kernel machine are typically given by the solution of a convex optimisation problem with a single global optimum. Obtaining the best p...
Gavin C. Cawley, Nicola L. C. Talbot
BMCBI
2008
146views more  BMCBI 2008»
13 years 11 months ago
nGASP - the nematode genome annotation assessment project
Background: While the C. elegans genome is extensively annotated, relatively little information is available for other Caenorhabditis species. The nematode genome annotation asses...
Avril Coghlan, Tristan J. Fiedler, Sheldon J. McKa...