Sciweavers

9503 search results - page 49 / 1901
» Authenticated System Calls
Sort
View
FASE
2003
Springer
15 years 9 months ago
Modelling Recursive Calls with UML State Diagrams
Abstract. One of the principal uses of UML is the modelling of synchronous object-oriented software systems, in which the behaviour of each of several classes is modelled using a s...
Jennifer Tenzer, Perdita Stevens
CP
2010
Springer
15 years 3 months ago
Context-Sensitive Call Control Using Constraints and Rules
Personalisation and context-awareness are fundamental concerns in Telephony. This paper introduces a rule-based system - 4CRULES - which enables context-sensitive call control by t...
David Lesaint, Deepak Mehta, Barry O'Sullivan, Lui...
APSEC
2005
IEEE
15 years 10 months ago
Call-Ordering Constraints
Several kinds of call-ordering problems have been identified, all of which present subtle difficulties in ensuring the correctness of a sequential program. They include object pro...
Nam Tran, David Abramson, Christine Mingins
ANLP
1997
103views more  ANLP 1997»
15 years 5 months ago
The NLP Role in Animated Conversation for CALL
Language learning is a relatively new application for natural language processing (NLP) and for intelligent tutoring and learning environments (ITLEs). NLP has a crucial role to p...
Michael Schoelles, Henry Hamburger
SIGOPS
2008
183views more  SIGOPS 2008»
15 years 4 months ago
Plan 9 authentication in Linux
In Linux, applications like su and login currently run as root in order to access authentication information and set or alter the identity of the process. In such cases, if the ap...
Ashwin Ganti