Sciweavers

2250 search results - page 412 / 450
» Authorizing applications in singularity
Sort
View
RTCSA
1998
IEEE
15 years 2 months ago
Wait-Free Snapshots in Real-Time Systems: Algorithms and Performance
Snap-shot mechanisms are used to read a globally consistent set of variable values. Such a mechanism can be used to solve a variety of communication and synchronization problems, ...
Andreas Ermedahl, Hans Hansson, Marina Papatrianta...
SP
1998
IEEE
173views Security Privacy» more  SP 1998»
15 years 2 months ago
An Automated Approach for Identifying Potential Vulnerabilities in Software
This paper presents results from analyzing the vulnerability of security-critical software applications to malicious threats and anomalous events using an automated fault injectio...
Anup K. Ghosh, Tom O'Connor, Gary McGraw
VVS
1998
IEEE
120views Visualization» more  VVS 1998»
15 years 2 months ago
Using Distance Maps for Accurate Surface Representation in Sampled Volumes
High quality rendering and physics-based modeling in volume graphics have been limited because intensity-based volumetric data do not represent surfaces well. High spatial frequen...
Sarah F. Frisken Gibson
CADE
1998
Springer
15 years 2 months ago
Strict Basic Superposition
It is a well-known fact that some form of factoring is necessary for completeness of paramodulation-based calculi of general first-order clauses. In this paper we give an overview...
Leo Bachmair, Harald Ganzinger
87
Voted
SIGMOD
1998
ACM
96views Database» more  SIGMOD 1998»
15 years 2 months ago
Wavelet-Based Histograms for Selectivity Estimation
Query optimization is an integral part of relational database management systems. One important task in query optimization is selectivity estimation, that is, given a query P, we ...
Yossi Matias, Jeffrey Scott Vitter, Min Wang