Sciweavers

164 search results - page 22 / 33
» How to Model Operational Risk If You Must
Sort
View
WSC
1997
14 years 11 months ago
Success Stories in Simulation in Health Care
Healthcare is a rapidly changing industry, and facilities are struggling to find tools to enhance their ability to keep up with the change. Healthcare staff have generally adapted...
Catherine Drury Barnes, Joaquin L. Quiason, Carson...
110
Voted
ISCA
2007
IEEE
171views Hardware» more  ISCA 2007»
15 years 4 months ago
Power provisioning for a warehouse-sized computer
Large-scale Internet services require a computing infrastructure that can be appropriately described as a warehouse-sized computing system. The cost of building datacenter facilit...
Xiaobo Fan, Wolf-Dietrich Weber, Luiz André...
82
Voted
CSFW
2006
IEEE
15 years 4 months ago
Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies
There is a growing interest in establishing rules to regulate the privacy of citizens in the treatment of sensitive personal data such as medical and financial records. Such rule...
Michael J. May, Carl A. Gunter, Insup Lee
ICFP
2012
ACM
13 years 16 days ago
Proof-producing synthesis of ML from higher-order logic
The higher-order logic found in proof assistants such as Coq and various HOL systems provides a convenient setting for the development and verification of pure functional program...
Magnus O. Myreen, Scott Owens
ICALP
2007
Springer
15 years 4 months ago
Checking and Spot-Checking the Correctness of Priority Queues
We revisit the problem of memory checking considered by Blum et al. [3]. In this model, a checker monitors the behavior of a data structure residing in unreliable memory given an a...
Matthew Chu, Sampath Kannan, Andrew McGregor