Sciweavers

4397 search results - page 468 / 880
» Relational Algebra Operations
Sort
View
COMPSAC
2008
IEEE
15 years 11 months ago
Mutation-Based Testing of Buffer Overflow Vulnerabilities
Buffer overflow (BOF) is one of the major vulnerabilities that leads to non-secure software. Testing an implementation for BOF vulnerabilities is challenging as the underlying rea...
Hossain Shahriar, Mohammad Zulkernine
GLOBECOM
2008
IEEE
15 years 11 months ago
Target-Based Power Control for Queueing Systems with Applications to Packet Switches
—Many data center devices, for instance packet switches, can be modeled within the context of resource constrained queueing systems. In this paper, we define a novel algorithm c...
Benjamin Yolken, Dimitrios Tsamis, Nicholas Bambos
IPPS
2007
IEEE
15 years 11 months ago
OS Mechanism for Continuation-based Fine-grained Threads on Dedicated and Commodity Processors
Fine-grained multithreading based on a natural model, such as dataflow model, is promising in achieving high efficiency and high programming productivity. In this paper, we disc...
Shigeru Kusakabe, Satoshi Yamada, Mitsuhiro Aono, ...
ATAL
2007
Springer
15 years 11 months ago
Integrating authority, deontics, and communications within a joint intention framework
Many agents are fielded within environments requiring modeling traditional organizational structures such as military hierarchies and corporations, with their associated authority...
Marcus J. Huber, Sanjeev Kumar, David McGee, Sean ...
HOLOMAS
2007
Springer
15 years 11 months ago
Information Agents Handling Semantic Data as an Extension to Process Monitoring Systems
An approach to extend process monitoring with the help of information agents (IA) handling semantic data is presented in this paper. According to this approach, an operator of a pr...
Teppo Pirttioja, Ilkka Seilonen, Antti Pakonen, Aa...