Sciweavers

3820 search results - page 646 / 764
» Bounded Model Debugging
Sort
View
ICPP
1998
IEEE
15 years 6 months ago
Improving Parallel-Disk Buffer Management using Randomized Writeback
We address the problems of I/O scheduling and buffer management for general reference strings in a parallel I/O system. Using the standard parallel disk model withD disks and a sh...
Mahesh Kallahalla, Peter J. Varman
ISCA
1998
IEEE
126views Hardware» more  ISCA 1998»
15 years 6 months ago
Switcherland: A QoS Communication Architecture for Workstation Clusters
Computer systems have become powerful enough to process continuous data streams such as video or animated graphics. While processing power and communication bandwidth of today...
Hans Eberle, Erwin Oertli
SP
1998
IEEE
116views Security Privacy» more  SP 1998»
15 years 6 months ago
Strand Spaces: Why is a Security Protocol Correct?
A strand is a sequence of events; it represents either the execution of legitimate party in a security protocol or else a sequence of actions by a penetrator. A strand space is a ...
F. Javier Thayer, Jonathan C. Herzog, Joshua D. Gu...
STOC
1998
ACM
135views Algorithms» more  STOC 1998»
15 years 6 months ago
Checking Polynomial Identities over any Field: Towards a Derandomization?
We present a Monte Carlo algorithm for testing multivariate polynomial identities over any field using fewer random bits than other methods. To test if a polynomial P(x1 ::: xn) ...
Daniel Lewin, Salil P. Vadhan
GIS
1998
ACM
15 years 6 months ago
Greedy Cuts: An Advancing Front Terrain Triangulation Algorithm
We apply an advancing front technique to the problem of simplification of dense digitized terrain models. While most simplification algorithms have been based on either incrementa...
Cláudio T. Silva, Joseph S. B. Mitchell