Sciweavers

10910 search results - page 2020 / 2182
» Input modeling using a computer algebra system
Sort
View
MIDDLEWARE
2004
Springer
15 years 3 months ago
Enabling collaborative adaptation across legacy components
Software frequently needs to adapt its behavior at run time to respond to changes in its execution environment. Different software components may use different approaches to adap...
Zhenxiao Yang, Zhinan Zhou, Betty H. C. Cheng, Phi...
APCSAC
2003
IEEE
15 years 3 months ago
User-Level Management of Kernel Memory
Abstract. Kernel memory is a resource that must be managed carefully in order to ensure the efficiency and safety of the system. The use of an inappropriate management policy can w...
Andreas Haeberlen, Kevin Elphinstone
IMC
2003
ACM
15 years 3 months ago
Simple network performance tomography
In network performance tomography, characteristics of the network interior are inferred by correlating end-to-end measurements. In much previous work, the presence of correlations...
Nick G. Duffield
EGH
2003
Springer
15 years 3 months ago
Simulation of cloud dynamics on graphics hardware
This paper presents a physically-based, visually-realistic interactive cloud simulation. Clouds in our system are modeled using partial differential equations describing fluid mot...
Mark J. Harris, William V. Baxter, Thorsten Scheue...
DBSEC
2009
110views Database» more  DBSEC 2009»
14 years 11 months ago
Distributed Privilege Enforcement in PACS
Abstract. We present a new access control mechanism for P2P networks with distributed enforcement, called P2P Access Control System (PACS). PACS enforces powerful access control mo...
Christoph Sturm, Ela Hunt, Marc H. Scholl
« Prev « First page 2020 / 2182 Last » Next »