Sciweavers

453 search results - page 43 / 91
» From restrictive to prescriptive design
Sort
View
DCC
2008
IEEE
15 years 9 months ago
Geometric Burrows-Wheeler Transform: Linking Range Searching and Text Indexing
We introduce a new variant of the popular Burrows-Wheeler transform (BWT) called Geometric Burrows-Wheeler Transform (GBWT). Unlike BWT, which merely permutes the text, GBWT conve...
Yu-Feng Chien, Wing-Kai Hon, Rahul Shah, Jeffrey S...
COCOA
2009
Springer
15 years 4 months ago
Recoverable Robust Timetables on Trees
In the context of scheduling and timetabling, we study a challenging combinatorial problem which is very interesting for both practical and theoretical points of view. The motivati...
Gianlorenzo D'Angelo, Gabriele Di Stefano, Alfredo...
APCSAC
2006
IEEE
15 years 3 months ago
Reorganizing UNIX for Reliability
In this paper, we discuss the architecture of a modular UNIX-compatible operating system, MINIX 3, that provides reliability beyond that of most other systems. With nearly the ent...
Jorrit N. Herder, Herbert Bos, Ben Gras, Philip Ho...
EMSOFT
2005
Springer
15 years 3 months ago
Random testing of interrupt-driven software
Interrupt-driven embedded software is hard to thoroughly test since it usually contains a very large number of executable paths. Developers can test more of these paths using rand...
John Regehr
ANSS
2003
IEEE
15 years 3 months ago
A Simulation Study of the Proactive Server Roaming for Mitigating Denial of Service Attacks
The main goal of the NETSEC project is to design and implement a framework for mitigating the effects of the node-based and link-based DoS attacks. Our strategy employs three lin...
Chatree Sangpachatanaruk, Sherif M. Khattab, Taieb...