Sciweavers

3557 search results - page 681 / 712
» Authoring Presentation for OpenMath
Sort
View
111
Voted
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 5 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
123
Voted
VVS
1998
IEEE
120views Visualization» more  VVS 1998»
15 years 4 months ago
Using Distance Maps for Accurate Surface Representation in Sampled Volumes
High quality rendering and physics-based modeling in volume graphics have been limited because intensity-based volumetric data do not represent surfaces well. High spatial frequen...
Sarah F. Frisken Gibson
90
Voted
CADE
1998
Springer
15 years 4 months ago
Strict Basic Superposition
It is a well-known fact that some form of factoring is necessary for completeness of paramodulation-based calculi of general first-order clauses. In this paper we give an overview...
Leo Bachmair, Harald Ganzinger
105
Voted
SIGMOD
1998
ACM
96views Database» more  SIGMOD 1998»
15 years 4 months ago
Wavelet-Based Histograms for Selectivity Estimation
Query optimization is an integral part of relational database management systems. One important task in query optimization is selectivity estimation, that is, given a query P, we ...
Yossi Matias, Jeffrey Scott Vitter, Min Wang
SIGOPSE
1998
ACM
15 years 4 months ago
Nested Java processes: OS structure for mobile code
The majority of work on protection in single-language mobile code environments focuses on information security issues and depends on the language environment for solutions to the ...
Patrick Tullmann, Jay Lepreau