Sciweavers

63 search results - page 8 / 13
» Transient analysis of tree-Like processes and its applicatio...
Sort
View
CCS
2007
ACM
14 years 1 months ago
Panorama: capturing system-wide information flow for malware detection and analysis
Malicious programs spy on users’ behavior and compromise their privacy. Even software from reputable vendors, such as Google Desktop and Sony DRM media player, may perform undes...
Heng Yin, Dawn Xiaodong Song, Manuel Egele, Christ...
CPHYSICS
2008
86views more  CPHYSICS 2008»
13 years 7 months ago
On ERI sorting for SIMD execution of large-scale Hartree-Fock SCF
Given the resurgent attractiveness of single-instruction-multiple-data (SIMD) processing, it is important for high-performance computing applications to be SIMD-capable. The Hartr...
Tirath Ramdas, Gregory K. Egan, David Abramson, Ki...
ISVD
2010
IEEE
13 years 5 months ago
Hydration Shells in Voronoi Tessellations
An interesting property of the Voronoi tessellation is studied in the context of its application to the analysis of hydration shells in computer simulation of solutions. Namely the...
V. P. Voloshin, Alexey V. Anikeenko, Nikolai N. Me...
SAS
2007
Springer
108views Formal Methods» more  SAS 2007»
14 years 1 months ago
Programming Language Design and Analysis Motivated by Hardware Evolution
Abstract. Silicon chip design has passed a threshold whereby exponentially increasing transistor density (Moore’s Law) no longer translates into increased processing power for si...
Alan Mycroft
JMLR
2006
389views more  JMLR 2006»
13 years 7 months ago
A Very Fast Learning Method for Neural Networks Based on Sensitivity Analysis
This paper introduces a learning method for two-layer feedforward neural networks based on sensitivity analysis, which uses a linear training algorithm for each of the two layers....
Enrique Castillo, Bertha Guijarro-Berdiñas,...