Sciweavers

1528 search results - page 107 / 306
» Implementing Generalized Operator Overloading
Sort
View
109
Voted
SOSP
2007
ACM
15 years 11 months ago
DejaView: a personal virtual computer recorder
As users interact with the world and their peers through their computers, it is becoming important to archive and later search the information that they have viewed. We present De...
Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Sha...
124
Voted
ECSQARU
2009
Springer
15 years 9 months ago
Merging Belief Bases Represented by Logic Programs
Abstract. This paper presents a method which allows for merging beliefs expressed thanks to logic programming with stable model semantics. This method is based on the syntactic mer...
Julien Hué, Odile Papini, Eric Würbel
ISW
2009
Springer
15 years 9 months ago
Hardware-Assisted Application-Level Access Control
Abstract. Applications typically rely on the operating system to enforce access control policies such as MAC, DAC, or other policies. However, in the face of a compromised operatin...
Yu-Yuan Chen, Ruby B. Lee
STORAGESS
2005
ACM
15 years 8 months ago
Ensuring data integrity in storage: techniques and applications
Data integrity is a fundamental aspect of storage security and reliability. With the advent of network storage and new technology trends that result in new failure modes for stora...
Gopalan Sivathanu, Charles P. Wright, Erez Zadok
SIGOPSE
2000
ACM
15 years 7 months ago
Congestion prices as feedback signals: an approach to QoS management
Recently there has been a renewed interest in the application of economic models to the management of computational resources. Most of this interest is focused on pricing models f...
Rolf Neugebauer, Derek McAuley