Sciweavers

2208 search results - page 193 / 442
» Memory Practices in the Sciences
Sort
View
HICSS
2006
IEEE
151views Biometrics» more  HICSS 2006»
15 years 4 months ago
Project Progress Tracking Template - Using a Repeatable GSS Process to Facilitate Project Process Management
This article presents the findings of an action research study in which a repeatable GSS (Group Support System) process was adopted by project teams to track their progress. The r...
Fang Chen, Robert O. Briggs, Gail Corbitt, Jay F. ...
HICSS
2005
IEEE
127views Biometrics» more  HICSS 2005»
15 years 4 months ago
Elephant: Network Intrusion Detection Systems that Don't Forget
Modern Network Intrusion Detection Systems (NIDSs) maintain state that helps them accurately detect attacks. Because most NIDSs are signature-based, it is critical to update their...
Michael G. Merideth, Priya Narasimhan
HICSS
2005
IEEE
121views Biometrics» more  HICSS 2005»
15 years 4 months ago
Java Architectures for Mobilised Enterprise Systems
The coming generation of mobile phones will enable objects from enterprise systems to be distributed across a range of devices of different scales. This object mobility will provi...
David Parsons
LICS
2005
IEEE
15 years 4 months ago
Mean-Payoff Parity Games
Games played on graphs may have qualitative objectives, such as the satisfaction of an ω-regular property, or quantitative objectives, such as the optimization of a realvalued re...
Krishnendu Chatterjee, Thomas A. Henzinger, Marcin...
LICS
2005
IEEE
15 years 4 months ago
Certifying Compilation for a Language with Stack Allocation
This paper describes an assembly-language type system capable of ensuring memory safety in the presence of both heap and stack allocation. The type system uses linear logic and a ...
Limin Jia, Frances Spalding, David Walker, Neal Gl...