Masaryk University

Displaying 1 - 9 of 9 results

  • Graph Mining and Outlier Detection Meet Logic Proof Tutoring

    White Papers // Jun 2014 // provided by Masaryk University

    The authors introduce a new method for analysis and evaluation of logic proofs constructed by undergraduate students, e.g. resolution or tableaux proofs. This method employs graph mining and outlier detection. The data has been obtained from a web-based system for input of logic proofs built at FI MU. The data ...

    Download Now
  • Impact of Modern OpenGL on FPS

    White Papers // May 2014 // provided by Masaryk University

    In this paper, the authors choose several old and modern features of OpenGL that applications use to render scenes and compare their impact on the rendering speed. They aim their comparison not solely on these features, but also on the type of hardware used for the measurements. They run their ...

    Download Now
  • Multi-Resource Aware Fairsharing for Heterogeneous Systems

    White Papers // May 2014 // provided by Masaryk University

    Current production resource management and scheduling systems often use some mechanism to guarantee fair sharing of computational resources among different users of the system. For example, the user who so far consumed small amount of CPU time gets higher priority and vice versa. However, different users may have highly heterogeneous ...

    Download Now
  • Multi Resource Fairness: Problems and Challenges

    White Papers // May 2013 // provided by Masaryk University

    Current production resource management and scheduling systems often use some mechanism to guarantee fair sharing of computational resources among different users of the system. For example, the user who so far consumed small amount of CPU time gets higher priority and vice versa. The problem with such a solution is ...

    Download Now
  • Agile BPM in the Age of Cloud Technologies

    White Papers // Jan 2013 // provided by Masaryk University

    This paper is focused on application of agile principles during adoption of Business Process Management (BPM) in an organization. The authors propose some agile techniques for gathering requirements and iterative process design. Such techniques help to obtain realistic processes which are easily adaptable to changing business requirements and do not ...

    Download Now
  • Revealing and Analysing Modem Malware

    White Papers // May 2012 // provided by Masaryk University

    Malware targeting broadband devices like ADSL modems, routers and wireless access points is very frequent in recent days. In this paper, the authors provide a formal description of modem malware life cycle. Furthermore, they propose a set of techniques to perform detailed analysis of infected modem and they provide the ...

    Download Now
  • GPU Implementation of Linear Morphological Openings with Arbitrary Angle

    White Papers // Mar 2012 // provided by Masaryk University

    Linear morphological openings and closings are important non-linear operators from mathematical morphology. In practical applications, many different orientations of digital line segments must typically be considered. In this paper, the authors review efficient sequential as well as parallel algorithms for the computation of linear openings and closings, compare the performance ...

    Download Now
  • STANSE: Bug-Finding Framework for C Programs

    White Papers // Feb 2012 // provided by Masaryk University

    STANSE is a free (available under the GPLv2 license) modular framework for finding bugs in C programs using static analysis. Its two main design goals are ability to process large software projects like the Linux kernel and extensibility with new bug-finding techniques with a minimal e ort. Currently there are ...

    Download Now
  • Multi-mechanism Single Sign-On in Grids

    White Papers // Dec 2008 // provided by Masaryk University

    Recently, a lot of effort has been invested in development of various types of authentication mechanisms that offer strong security characteristics for building grid systems. Being based on one of the mechanisms, most grid environments today provide strong authentication protocols, however, they are usually bound with only one, in most ...

    Download Now

Submit Your Content

Get your content listed in our directory for free!

Our directory is the largest library of vendor-supplied technical content on the web. It's also the first place IT decision makers turn to when researching technology solutions. Our members are already finding your competitors' papers here - shouldn't they find yours too?