Sciweavers

214 search results - page 29 / 43
» An Overview of the NetWare Operating System
Sort
View
QI
2009
Springer
117views Physics» more  QI 2009»
15 years 6 months ago
Generalising Unitary Time Evolution
In this third Quantum Interaction (QI) meeting it is time to examine our failures. One of the weakest elements of QI as a field, arises in its continuing lack of models displaying...
Kirsty Kitto, Peter Bruza, Laurianne Sitbon
IFL
1998
Springer
113views Formal Methods» more  IFL 1998»
15 years 3 months ago
Shared Memory Multiprocessor Support for SAC
Abstract. Sac (Single Assignment C) is a strict, purely functional programming language primarily designed with numerical applications in mind. Particular emphasis is on efficient ...
Clemens Grelck
APWEB
2008
Springer
15 years 1 months ago
Traceable P2P Record Exchange Based on Database Technologies
Information exchanges in P2P networks have become very popular in recent years. However, tracing how data circulates between peers and how data modifications are performed during t...
Fengrong Li, Yoshiharu Ishikawa
FLAIRS
2004
15 years 1 months ago
Structure Discovery from Sequential Data
In this paper we describe I-Subdue, an extension to the Subdue graph-based data mining system. I-Subdue operates over sequentially received relational data to incrementally discov...
Jeffrey Coble, Diane J. Cook, Lawrence B. Holder, ...
CORR
2010
Springer
135views Education» more  CORR 2010»
14 years 11 months ago
JIT Spraying and Mitigations
With the discovery of new exploit techniques, novel protection mechanisms are needed as well. Mitigations like DEP (Data Execution Prevention) or ASLR (Address Space Layout Random...
Piotr Bania