Sciweavers

3388 search results - page 659 / 678
» Type-theoretic design patterns
Sort
View
USS
2004
13 years 9 months ago
Autograph: Toward Automated, Distributed Worm Signature Detection
Today's Internet intrusion detection systems (IDSes) monitor edge networks' DMZs to identify and/or filter malicious flows. While an IDS helps protect the hosts on its l...
Hyang-Ah Kim, Brad Karp
WSCG
2003
167views more  WSCG 2003»
13 years 9 months ago
Vector-valued Image Restoration with Applications to Magnetic Resonance Velocity Imaging
The analysis of blood flow patterns and the interaction between salient topological flow features and cardiovascular structure plays an important role in the study of cardiovascul...
Yin-Heung Pauline Ng, Guang-Zhong Yang
TREC
2000
13 years 9 months ago
Syntactic Clues and Lexical Resources in Question-Answering
CL Research's question-answering system (DIMAP-QA) for TREC-9 significantly extends its semantic relation triple (logical form) technology in which documents are fully parsed...
Kenneth C. Litkowski
WEBNET
2000
13 years 9 months ago
New Approaches to Law Education: Making the Case for Web-based Learning
: Web-based instruction and online learning are changing customary practices in education. As conventional patterns for content delivery are influenced by new and improving technol...
Jennifer Gramling, Tom Galligan, Jean A. Derco
CASCON
1996
139views Education» more  CASCON 1996»
13 years 9 months ago
Data locality sensitivity of multithreaded computations on a distributed-memory multiprocessor
The locality of the data in parallel programs is known to have a strong impact on the performance of distributed-memory multiprocessor systems. The worse the locality in access pa...
Xinmin Tian, Shashank S. Nemawarkar, Guang R. Gao,...