Sciweavers

598 search results - page 74 / 120
» Typing the Numeric Tower
Sort
View
AIRS
2004
Springer
14 years 2 months ago
On Bit-Parallel Processing of Multi-byte Text
There exist practical bit-parallel algorithms for several types of pair-wise string processing, such as longest common subsequence computation or approximate string matching. The b...
Heikki Hyyrö, Jun Takaba, Ayumi Shinohara, Ma...
ATAL
2004
Springer
14 years 2 months ago
Analysis of a Stochastic Model of Adaptive Task Allocation in Robots
Adaptation is an essential requirement for self–organizing multi–agent systems functioning in unknown dynamic environments. Adaptation allows agents, e.g., robots, to change th...
Aram Galstyan, Kristina Lerman
IAW
2003
IEEE
14 years 2 months ago
The Use of Honeynets to Detect Exploited Systems Across Large Enterprise Networks
– Computer Networks connected to the Internet continue to be compromised and exploited by hackers. This is in spite of the fact that many networks run some type of security mecha...
John G. Levine, Richard LaBella, Henry L. Owen, Di...
IPPS
2003
IEEE
14 years 2 months ago
Wrapping Legacy Codes for Grid-Based Applications
This paper describes a process for the semi-automatic conversion of numerical and scientific routines written in the C programming language into Triana-based computational servic...
Yan Huang, Ian Taylor, David W. Walker, Robert Dav...
NSPW
2003
ACM
14 years 2 months ago
Owner-controlled information
Large-scale data breaches exposing sensitive personal information are becoming commonplace. For numerous reasons, conventional personal (identification) information leaks from da...
Carrie Gates, Jacob Slonim