Sciweavers

3310 search results - page 69 / 662
» Aspect-aware operating system development
Sort
View
ICDE
2009
IEEE
138views Database» more  ICDE 2009»
14 years 9 months ago
Similarity Group-By
The identification and processing of similarities in the data play a key role in multiple application scenarios. Several types of similarity-aware operations have been studied in ...
Yasin N. Silva, Walid G. Aref, Mohamed H. Ali
IWFM
1998
15 years 1 months ago
Towards an Override in Topoi
Models of software systems are built in Z and VDM using partial functions between sets and certain operations on these partial functions : extension ( ), restriction ( ), removal ...
Arthur P. Hughes
92
Voted
USENIX
2007
15 years 2 months ago
From Trusted to Secure: Building and Executing Applications That Enforce System Security
Commercial operating systems have recently introduced mandatory access controls (MAC) that can be used to ensure system-wide data confidentiality and integrity. These protections...
Boniface Hicks, Sandra Rueda, Trent Jaeger, Patric...
ICRA
2009
IEEE
86views Robotics» more  ICRA 2009»
15 years 6 months ago
Transmission of tactile roughness through master-slave systems
Abstract— In this study, a tactile-roughness transmission system applicable to master-slave systems with a communication time delay is developed. The master-side system construct...
Shogo Okamoto, Masashi Konyo, Takashi Maeno, Satos...
SAC
2008
ACM
14 years 11 months ago
Frequent pattern mining for kernel trace data
Operating systems engineers have developed tracing tools that log details about process execution at the kernel level. These tools make it easier to understand the actual executio...
Christopher LaRosa, Li Xiong, Ken Mandelberg