Sciweavers

1781 search results - page 308 / 357
» Visualizing program execution using user abstractions
Sort
View
CEC
2008
IEEE
14 years 3 months ago
DCA for bot detection
Abstract— Ensuring the security of computers is a nontrivial task, with many techniques used by malicious users to compromise these systems. In recent years a new threat has emer...
Yousof Al-Hammadi, Uwe Aickelin, Julie Greensmith
ICST
2011
IEEE
13 years 15 days ago
EFindBugs: Effective Error Ranking for FindBugs
—Static analysis tools have been widely used to detect potential defects without executing programs. It helps programmers raise the awareness about subtle correctness issues in t...
Haihao Shen, Jianhong Fang, Jianjun Zhao
ESA
1998
Springer
162views Algorithms» more  ESA 1998»
14 years 12 days ago
External Memory Algorithms
Abstract. Data sets in large applications are often too massive to t completely inside the computer's internal memory. The resulting input output communication or I O between ...
Jeffrey Scott Vitter
HPDC
2010
IEEE
13 years 10 months ago
Reshaping text data for efficient processing on Amazon EC2
Text analysis tools are nowadays required to process increasingly large corpora which are often organized as small files (abstracts, news articles, etc). Cloud computing offers a ...
Gabriela Turcu, Ian T. Foster, Svetlozar Nestorov
CSAC
2006
13 years 10 months ago
Managing Network Troubles while Interacting within Collaborative Virtual Environments
Abstract. We are interested in real time collaborative interactions within Collaborative Virtual Environments (CVE). This domain relies on the low latency offered by high speed net...
Thierry Duval, Chadi El Zammar