Sciweavers

8347 search results - page 1544 / 1670
» Performance testing of software systems
Sort
View
216
Voted
ASPLOS
1998
ACM
15 years 8 months ago
A Cost-Effective, High-Bandwidth Storage Architecture
This paper describes the Network-Attached Secure Disk (NASD) storage architecture, prototype implementations of NASD drives, array management for our architecture, and three files...
Garth A. Gibson, David Nagle, Khalil Amiri, Jeff B...
VLDB
1997
ACM
104views Database» more  VLDB 1997»
15 years 7 months ago
Integrating Reliable Memory in Databases
Abstract. Recent results in the Rio project at the University of Michigan show that it is possible to create an area of main memory that is as safe as disk from operating system cr...
Wee Teck Ng, Peter M. Chen
141
Voted
ATAL
2006
Springer
15 years 7 months ago
Magenta technology multi-agent logistics i-Scheduler for road transportation
The paper describes main features of an Intelligent Scheduler for Road Transportation Applications based on Magenta agent technology and characterized by a number of unique, advan...
Jonathan Himoff, George Rzevski, Petr Skobelev
157
Voted
SCA
2007
15 years 6 months ago
Face poser: interactive modeling of 3D facial expressions using model priors
In this paper, we present an intuitive interface for interactively posing 3D facial expressions. The user can create and edit facial expressions by drawing freeform strokes, or by...
Manfred Lau, Jinxiang Chai, Ying-Qing Xu, Heung-Ye...
130
Voted
USS
2008
15 years 6 months ago
Automatic Generation of XSS and SQL Injection Attacks with Goal-Directed Model Checking
Cross-site scripting (XSS) and SQL injection errors are two prominent examples of taint-based vulnerabilities that have been responsible for a large number of security breaches in...
Michael C. Martin, Monica S. Lam
« Prev « First page 1544 / 1670 Last » Next »