Sciweavers

2061 search results - page 395 / 413
» Authorization for Metacomputing Applications
Sort
View
93
Voted
WSC
1998
15 years 1 months ago
Simulation Optimization Research and Development
Simulation optimization is rapidly becoming a mainstream tool for simulation practitioners. Simulation optimization is the practice of linking an optimization method with a simula...
Royce Bowden, John D. Hall
86
Voted
NIPS
1997
15 years 1 months ago
Bayesian Model of Surface Perception
Image intensity variations can result from several different object surface effects, including shading from 3-dimensional relief of the object, or paint on the surface itself. An ...
William T. Freeman, Paul A. Viola
101
Voted
ACL
1996
15 years 1 months ago
Combining Trigram-based and Feature-based Methods for Context-Sensitive Spelling Correction
This paper addresses the problem of correcting spelling errors that result in valid, though unintended words (such as peace and piece, or quiet and quite) and also the problem of ...
Andrew R. Golding, Yves Schabes
116
Voted
OSDI
1996
ACM
15 years 1 months ago
Safe Kernel Extensions Without Run-Time Checking
This paper describes a mechanism by which an operating system kernel can determine with certainty that it is safe to execute a binary supplied by an untrusted source. The kernel r...
George C. Necula, Peter Lee
108
Voted
DS
1992
128views Database» more  DS 1992»
15 years 1 months ago
Achieving Incremental Consistency among Autonomous Replicated Databases
In this paper, we present methods for supporting autonomous updates in replicated databases. Autonomous updates are of particular importance to applications that cannot tolerate t...
Stefano Ceri, Maurice A. W. Houtsma, Arthur M. Kel...