Sciweavers

16968 search results - page 3287 / 3394
» Software Engineering in the Small
Sort
View
CCS
2011
ACM
14 years 5 months ago
Automatic error finding in access-control policies
Verifying that access-control systems maintain desired security properties is recognized as an important problem in security. Enterprise access-control systems have grown to prote...
Karthick Jayaraman, Vijay Ganesh, Mahesh V. Tripun...
PPOPP
2012
ACM
14 years 1 months ago
A speculation-friendly binary search tree
We introduce the first binary search tree algorithm designed for speculative executions. Prior to this work, tree structures were mainly designed for their pessimistic (non-specu...
Tyler Crain, Vincent Gramoli, Michel Raynal
BPM
2005
Springer
228views Business» more  BPM 2005»
15 years 11 months ago
Risk Management in the BPM Lifecycle
Business Process Management is considered an essential strategy to create and maintain competitive advantage by streamlining and monitoring corporate processes. While the identific...
Michael zur Muehlen, Danny Ting-Yi Ho
PLDI
2012
ACM
13 years 8 months ago
Understanding and detecting real-world performance bugs
Developers frequently use inefficient code sequences that could be fixed by simple patches. These inefficient code sequences can cause significant performance degradation and ...
Guoliang Jin, Linhai Song, Xiaoming Shi, Joel Sche...
ICCV
2009
IEEE
16 years 10 months ago
Light Field Video Stabilization
We describe a method for producing a smooth, stabilized video from the shaky input of a hand-held light field video camera— specifically, a small camera array. Traditional stab...
Brandon M. Smith, Li Zhang, Hailin Jin, Aseem Agar...
« Prev « First page 3287 / 3394 Last » Next »