Sciweavers

1855 search results - page 39 / 371
» System Consequence
Sort
View
HOTDEP
2008
157views Hardware» more  HOTDEP 2008»
15 years 2 months ago
Byzantium: Byzantine-Fault-Tolerant Database Replication Providing Snapshot Isolation
Database systems are a key component behind many of today's computer systems. As a consequence, it is crucial that database systems provide correct and continuous service des...
Nuno M. Preguiça, Rodrigo Rodrigues, Crist&...
CSFW
2010
IEEE
15 years 3 months ago
Constraining Credential Usage in Logic-Based Access Control
—Authorization logics allow concise specification of flexible access-control policies, and are the basis for logic-based access-control systems. In such systems, resource owner...
Lujo Bauer, Limin Jia, Divya Sharma
IEE
2008
100views more  IEE 2008»
14 years 12 months ago
A lightweight technique for assessing risks in requirements analysis
: A simple and practical technique for assessing the risks, that is, the potential for error, and consequent loss, in software system development, acquired during a requirements en...
Kenneth Boness, Anthony Finkelstein, Rachel Harris...
COMPGEOM
2010
ACM
15 years 4 months ago
Consistent digital line segments
We introduce a novel and general approach for digitalization of line segments in the plane that satisfies a set of axioms naturally arising from Euclidean axioms. In particular, ...
Tobias Christ, Dömötör Pálv&...
EMNLP
2010
14 years 9 months ago
PEM: A Paraphrase Evaluation Metric Exploiting Parallel Texts
We present PEM, the first fully automatic metric to evaluate the quality of paraphrases, and consequently, that of paraphrase generation systems. Our metric is based on three crit...
Chang Liu, Daniel Dahlmeier, Hwee Tou Ng