Sciweavers

9842 search results - page 1572 / 1969
» Compositional timing analysis
Sort
View
SP
2005
IEEE
104views Security Privacy» more  SP 2005»
15 years 10 months ago
On Safety in Discretionary Access Control
An apparently prevailing myth is that safety is undecidable in Discretionary Access Control (DAC); therefore, one needs to invent new DAC schemes in which safety analysis is decid...
Ninghui Li, Mahesh V. Tripunitara
WONS
2005
IEEE
15 years 10 months ago
A Partition Prediction Algorithm for Service Replication in Mobile Ad Hoc Networks
Due to the mobility of nodes in Ad hoc networks, network topology is dynamic and unpredictable, which leads to frequent network partitioning. This partitioning disconnects many no...
Abdelouahid Derhab, Nadjib Badache, Abdelmadjid Bo...
ACMMSP
2005
ACM
99views Hardware» more  ACMMSP 2005»
15 years 10 months ago
Gated memory control for memory monitoring, leak detection and garbage collection
ct In the past, program monitoring often operates at the code level, performing checks at function and loop boundaries. Recent research shows that profiling analysis can identify ...
Chen Ding, Chengliang Zhang, Xipeng Shen, Mitsunor...
IUI
2005
ACM
15 years 10 months ago
SmartCanvas: a gesture-driven intelligent drawing desk system
This paper describes SmartCanvas, an intelligent desk system that allows a user to perform freehand drawing on a desk or similar surface with gestures. Our system requires one cam...
Zhenyao Mo, John P. Lewis, Ulrich Neumann
MINENET
2005
ACM
15 years 10 months ago
Shrink: a tool for failure diagnosis in IP networks
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneo...
Srikanth Kandula, Dina Katabi, Jean-Philippe Vasse...
« Prev « First page 1572 / 1969 Last » Next »