Sciweavers

4511 search results - page 741 / 903
» Observation Based System Security
Sort
View
116
Voted
HASE
1998
IEEE
15 years 7 months ago
Estimating the Number of Residual Defects
Residual defects is one of the most important factors that allow one to decide if a piece of software is ready to be released. In theory, one can find all the defects and count th...
Yashwant K. Malaiya, Jason Denton
122
Voted
HYBRID
1998
Springer
15 years 7 months ago
A Connectionist Simulation of the Empirical Acquisition of Grammatical Relations
Abstract. This paper proposes an account of the acquisition of grammatical relations using the basic concepts of connectionism and a construction-based theory of grammar. Many prev...
William C. Morris, Garrison W. Cottrell, Jeffrey L...
124
Voted
RTSS
1997
IEEE
15 years 7 months ago
Response-time guarantees in ATM networks
We present a method for providing response-time guarantees in Asynchronous Transfer Mode (ATM) networks. The method is based on traditional real-time CPU Response-Time Analysis (R...
Andreas Ermedahl, Hans Hansson, Mikael Sjödin
135
Voted
VLDB
1994
ACM
152views Database» more  VLDB 1994»
15 years 7 months ago
The GMAP: A Versatile Tool for Physical Data Independence
Physical data independence is touted as a central feature of modern database systems. Both relational and object-oriented systems, however, force users to frame their queries in t...
Odysseas G. Tsatalos, Marvin H. Solomon, Yannis E....
106
Voted
CASES
2007
ACM
15 years 7 months ago
An optimistic and conservative register assignment heuristic for chordal graphs
This paper presents a new register assignment heuristic for procedures in SSA Form, whose interference graphs are chordal; the heuristic is called optimistic chordal coloring (OCC...
Philip Brisk, Ajay K. Verma, Paolo Ienne