Sciweavers

4744 search results - page 163 / 949
» Connected Computing
Sort
View
116
Voted
SIGMOD
2010
ACM
239views Database» more  SIGMOD 2010»
15 years 8 months ago
Computing label-constraint reachability in graph databases
Our world today is generating huge amounts of graph data such as social networks, biological networks, and the semantic web. Many of these real-world graphs are edge-labeled graph...
Ruoming Jin, Hui Hong, Haixun Wang, Ning Ruan, Yan...
PLDI
1994
ACM
15 years 7 months ago
The Program Structure Tree: Computing Control Regions in Linear Time
In this paper, we describe the program structure tree (PST), a hierarchical representation of program structure based on single entry single exit (SESE) regions of the control flo...
Richard Johnson, David Pearson, Keshav Pingali
109
Voted
AAAI
2007
15 years 5 months ago
Computational Aspects of Covering in Dominance Graphs
Various problems in AI and multiagent systems can be tackled by finding the “most desirable” elements of a set given some binary relation. Examples can be found in areas as d...
Felix Brandt, Felix A. Fischer
CCS
2008
ACM
15 years 5 months ago
BootJacker: compromising computers using forced restarts
BootJacker is a proof-of-concept attack tool which demonstrates that authentication mechanisms employed by an operating system can be bypassed by obtaining physical access and sim...
Ellick Chan, Jeffrey C. Carlyle, Francis M. David,...
IADIS
2004
15 years 4 months ago
A Framework for Symbolic Distributed Computer-Aided Design over the Internet
Economical globalization and outsourcing have inspired the surge of research in distributed computer-aided design. This paper presents a framework for Internet-based symbolic dist...
Yingcai Xiao, Shivakumar Kubendrachari