Sciweavers

524 search results - page 95 / 105
» Why phishing works
Sort
View
IWPC
2002
IEEE
14 years 2 months ago
Comprehension of Object-Oriented Software Cohesion: The Empirical Quagmire
It is a little over ten years since Chidamber and Kemerer's obje ct-oriented (OO) metric suite which included the Lack of Cohesion Of Methods (LCOM) metric was rst proposed 9...
Steve Counsell, Emilia Mendes, Stephen Swift
SAC
2009
ACM
14 years 2 months ago
Impact of function inlining on resource-constrained embedded systems
With the development of computer systems, function inlining schemes were used to reduce execution time while increasing codes. In embedded systems such as wireless sensor nodes, t...
Bongjae Kim, Sangho Yi, Yookun Cho, Jiman Hong
LSSC
2001
Springer
14 years 2 months ago
Parallel Implementation of a Large-Scale 3-D Air Pollution Model
Abstract. Air pollution models can efficiently be used in different environmental studies. The atmosphere is the most dynamic component of the environment, where the pollutants ca...
Tzvetan Ostromsky, Zahari Zlatev
ANTS
2000
Springer
133views Algorithms» more  ANTS 2000»
14 years 2 months ago
Lifting Elliptic Curves and Solving the Elliptic Curve Discrete Logarithm Problem
Abstract. Essentially all subexponential time algorithms for the discrete logarithm problem over nite elds are based on the index calculus idea. In proposing cryptosystems based on...
Ming-Deh A. Huang, Ka Lam Kueh, Ki-Seng Tan
ICDE
2010
IEEE
203views Database» more  ICDE 2010»
14 years 2 months ago
Optimizing ETL workflows for fault-tolerance
Extract-Transform-Load (ETL) processes play an important role in data warehousing. Typically, design work on ETL has focused on performance as the sole metric to make sure that the...
Alkis Simitsis, Kevin Wilkinson, Umeshwar Dayal, M...