Sciweavers

2061 search results - page 395 / 413
» Authorization for Metacomputing Applications
Sort
View
WSC
1998
14 years 11 months ago
Simulation Optimization Research and Development
Simulation optimization is rapidly becoming a mainstream tool for simulation practitioners. Simulation optimization is the practice of linking an optimization method with a simula...
Royce Bowden, John D. Hall
NIPS
1997
14 years 11 months ago
Bayesian Model of Surface Perception
Image intensity variations can result from several different object surface effects, including shading from 3-dimensional relief of the object, or paint on the surface itself. An ...
William T. Freeman, Paul A. Viola
ACL
1996
14 years 11 months ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes
98
Voted
OSDI
1996
ACM
14 years 11 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
DS
1992
128views Database» more  DS 1992»
14 years 11 months ago
Achieving Incremental Consistency among Autonomous Replicated Databases
In this paper, we present methods for supporting autonomous updates in replicated databases. Autonomous updates are of particular importance to applications that cannot tolerate t...
Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Kel...