Sciweavers

551 search results - page 38 / 111
» Preventing existence
Sort
View
JFP
2006
119views more  JFP 2006»
14 years 11 months ago
Gencel: a program generator for correct spreadsheets
A huge discrepancy between theory and practice exists in one popular application area of functional programming--spreadsheets. Although spreadsheets are the most frequently used (...
Martin Erwig, Robin Abraham, Steve Kollmansberger,...
RITA
2006
302views more  RITA 2006»
14 years 11 months ago
Content-Based Image Retrieval: Theory and Applications
: Advances in data storage and image acquisition technologies have enabled the creation of large image datasets. In this scenario, it is necessary to develop appropriate informatio...
Ricardo da Silva Torres, Alexandre X. Falcã...
COMPSEC
2002
92views more  COMPSEC 2002»
14 years 11 months ago
A practical key management scheme for access control in a user hierarchy
In a user hierarchy we say that a security class is subordinate to another security class if the former has a lower security privilege than the latter. To implement such a hierarc...
Sheng Zhong
TON
1998
77views more  TON 1998»
14 years 11 months ago
Time-shift scheduling - fair scheduling of flows in high-speed networks
—We present a scheduling protocol, called time-shift scheduling, to forward packets from multiple input flows to a single output channel. Each input flow is guaranteed a predet...
Jorge Arturo Cobb, Mohamed G. Gouda, Amal El-Nahas
DAC
2011
ACM
13 years 11 months ago
Process-level virtualization for runtime adaptation of embedded software
Modern processor architectures call for software that is highly tuned to an unpredictable operating environment. Processlevel virtualization systems allow existing software to ada...
Kim M. Hazelwood