Sciweavers

2061 search results - page 382 / 413
» Authorization for Metacomputing Applications
Sort
View
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
97
Voted
VVS
1998
IEEE
120views Visualization» more  VVS 1998»
15 years 2 months ago
Using Distance Maps for Accurate Surface Representation in Sampled Volumes
High quality rendering and physics-based modeling in volume graphics have been limited because intensity-based volumetric data do not represent surfaces well. High spatial frequen...
Sarah F. Frisken Gibson
CADE
1998
Springer
15 years 2 months ago
Strict Basic Superposition
It is a well-known fact that some form of factoring is necessary for completeness of paramodulation-based calculi of general first-order clauses. In this paper we give an overview...
Leo Bachmair, Harald Ganzinger
90
Voted
SIGMOD
1998
ACM
96views Database» more  SIGMOD 1998»
15 years 2 months ago
Wavelet-Based Histograms for Selectivity Estimation
Query optimization is an integral part of relational database management systems. One important task in query optimization is selectivity estimation, that is, given a query P, we ...
Yossi Matias, Jeffrey Scott Vitter, Min Wang
89
Voted
ECAI
1998
Springer
15 years 2 months ago
What You See Is What You Meant: direct knowledge editing with natural language feedback
Many kinds of knowledge-based system would be easier to develop and maintain if domain experts (as opposed to knowledge engineers) were in a position to define and edit the knowled...
Richard Power, Donia Scott, Roger Evans