• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 2,420
Next 10 →

A Scalable Linear Algebra Library for Distributed Memory Concurrent Computers

by Jaeyoung Choi, Jack J. Dongarra, Roldan Pozo, David W. Walker , 1992
"... This paper describes ScaLAPACK, a distributed memory version of the LAPACK software package for dense and banded matrix computations. Key design features are the use of distributed versions of the Level LAS as building blocks, and an ob ect-based interface to the library routines. The square block s ..."
Abstract - Cited by 176 (29 self) - Add to MetaCart
This paper describes ScaLAPACK, a distributed memory version of the LAPACK software package for dense and banded matrix computations. Key design features are the use of distributed versions of the Level LAS as building blocks, and an ob ect-based interface to the library routines. The square block

User-guided 3D active contour segmentation of anatomical structures: Significantly improved efficiency and reliability

by Paul A. Yushkevich, Joseph Piven, C Heather Cody Hazlett, C Rachel Gimpel Smith, C Sean Ho, James C. Gee, Guido Gerig B - NeuroImage , 2006
"... Active contour segmentation and its robust implementation using level set methods are well-established theoretical approaches that have been studied thoroughly in the image analysis literature. Despite the existence of these powerful segmentation methods, the needs of clinical research continue to b ..."
Abstract - Cited by 179 (12 self) - Add to MetaCart
to be fulfilled, to a large extent, using slice-by-slice manual tracing. To bridge the gap between methodological advances and clinical routine, we developed an open source application called ITK-SNAP, which is intended to make level set segmentation easily accessible to a wide range of users, including those

Pvm 3 User's Guide And Reference Manual

by Al Geist, Adam Beguelin, Jack Dongarra, Weicheng Jiang, Robert Manchek, Vaidy Sunderam , 1994
"... This is a draft of the PVM version 3.3 users' guide and reference manual. It contains an overview of PVM, and how version 3 can be obtained, installed and used. PVM stands for Parallel Virtual Machine. It is a software package that allows a heterogeneous network of parallel and serial computers ..."
Abstract - Cited by 165 (9 self) - Add to MetaCart
This is a draft of the PVM version 3.3 users' guide and reference manual. It contains an overview of PVM, and how version 3 can be obtained, installed and used. PVM stands for Parallel Virtual Machine. It is a software package that allows a heterogeneous network of parallel and serial

TEMPORAL ROUTINES FOR GENERATIONAL PRODUCT INNOVATION IN COMPUTER SOFTWARE

by Scott F. Turner, Richard A. Bettis, Will Mitchell
"... COMPUTER SOFTWARE This study examines time-based pacing of generational product innovation in the applications software industry. We argue that firms tend to develop temporal routines for introducing generational product innovations due to customer demands and internal operating procedures that valu ..."
Abstract - Add to MetaCart
COMPUTER SOFTWARE This study examines time-based pacing of generational product innovation in the applications software industry. We argue that firms tend to develop temporal routines for introducing generational product innovations due to customer demands and internal operating procedures

Extracting Classes from Routine Calls in Legacy Software

by Nicolas Anquetil, Timothy Lethbridge , 1998
"... Extracting object-oriented design from procedural code is an important issue in software maintenance. Existing research in this direction puts a heavy burden on the experts of the system being studied. To try to automate the process, we propose a new method to cluster together routines that are s ..."
Abstract - Add to MetaCart
Extracting object-oriented design from procedural code is an important issue in software maintenance. Existing research in this direction puts a heavy burden on the experts of the system being studied. To try to automate the process, we propose a new method to cluster together routines

Vertical Migration of Numerical Routines in Software and Microcode

by C. C. Charlton, P. H. Leng, J. Little, L Bx U. K , 1991
"... this paper, we report on work to improve, by vertical migration, the performance of the basic linear algebra subroutines of the FORTRAN NAG library. We identify a number of different migration strategies based upon the availability of two migration levels and report on the performance gains achie ..."
Abstract - Add to MetaCart
achieved by applying each of these strategies; various conditions under which each strategy may be most appropriate have thus been identified. In particular, this work shows how, by careful selection of just a small number of target routines, resulting performance gains can not only be significant

UG -- A Flexible Software Toolbox For Solving Partial Differential Equations

by P. Bastian, K. Birken, K. Johannsen, S. Lang, N. Neuss, H. RENTZ-REICHERT, C. Wieners - COMPUTING AND VISUALIZATION IN SCIENCE , 1997
"... Over the past two decades, some very efficient techniques for the numerical solution of partial differential equations have been developed. We are especially interested in adaptive local grid refinement on unstructured meshes, multigrid solvers and parallelization techniques. Up to now, these innova ..."
Abstract - Cited by 109 (21 self) - Add to MetaCart
to be mature enough for routine application. Secondly, the implementation of all these techniques in a code with sufficient generality requires a lot of time and know-how in different fields. UG (abbreviation for Unstructured Grids) has been designed to overcome these problems. It provides very general tools

Sound and Precise Analysis of Web Applications for Injection Vulnerabilities

by Gary Wassermann, Zhendong Su - PLDI'07 , 2007
"... Web applications are popular targets of security attacks. One common type of such attacks is SQL injection, where an attacker exploits faulty application code to execute maliciously crafted database queries. Both static and dynamic approaches have been proposed to detect or prevent SQL injections; w ..."
Abstract - Cited by 161 (5 self) - Add to MetaCart
; while dynamic approaches provide protection for deployed software, static approaches can detect potential vulnerabilities before software deployment. Previous static approaches are mostly based on tainted information flow tracking and have at least some of the following limitations: (1) they do

Configuring software, Reconfiguring Memories: The Influence of Integrated Systems on the Reproduction of Knowledge and Routines

by Luciana D’Adderio - INDUSTRIAL AND CORPORATE CHANGE , 2003
"... Recent advances in information and communication technologies (ICTs) have provided a substantial push towards the codification of organisational knowledge and practices. It is argued that codification, and the subsequent delegation of organisational memory to software, entails fundamental structural ..."
Abstract - Cited by 19 (0 self) - Add to MetaCart
structural transformations to knowledge and routines as these are reconfigured and replicated in the form of new computer-embedded representations. The paper demonstrates that the process of embedding knowledge and routines in software holds fundamental implications for the ability of heterogeneous

KIDS - A Knowledge-Based Software Development System

by Douglas R. Smith - Automating Software Design , 1990
"... The Kestrel Interactive Development System (KIDS) provides knowledge-based support for the derivation of correct and efficient programs from formal specifications. We trace the use of KIDS in deriving an algorithm for solving a problem arising from the design of sonar and radar signals. This derivat ..."
Abstract - Cited by 81 (6 self) - Add to MetaCart
interaction. Dozens of programs have been derived using the KIDS environment and we believe that it could be developed to the point where it can be used for routine programming.
Next 10 →
Results 11 - 20 of 2,420
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University