Sciweavers

3093 search results - page 507 / 619
» The Multi-perspective Process Explorer
Sort
View
USS
2008
15 years 1 months ago
Towards Application Security on Untrusted Operating Systems
Complexity in commodity operating systems makes compromises inevitable. Consequently, a great deal of work has examined how to protect security-critical portions of applications f...
Dan R. K. Ports, Tal Garfinkel
USS
2008
15 years 1 months ago
Practical Symmetric Key Cryptography on Modern Graphics Hardware
Graphics processors are continuing their trend of vastly outperforming CPUs while becoming more general purpose. The latest generation of graphics processors have introduced the a...
Owen Harrison, John Waldron
ICDT
2010
ACM
194views Database» more  ICDT 2010»
15 years 1 months ago
Bag Equivalence of XPath Queries
When a query is evaluated under bag semantics, each answer is returned as many times as it has derivations. Bag semantics has long been recognized as important, especially when ag...
Sara Cohen, Yaacov Y. Weiss
ACMDIS
2008
ACM
15 years 1 months ago
Paper interface to electronic medical records: a case of usage-driven technology appropriation
We conducted a 6-month project with a physical therapy clinic, involving equal parts ethnographic fieldwork and rapid prototyping. It differed from most reported user-informed des...
Elin Rønby Pedersen, Greg Wolff
APN
2008
Springer
15 years 1 months ago
MC-SOG: An LTL Model Checker Based on Symbolic Observation Graphs
Model checking is a powerful and widespread technique for the verification of finite distributed systems. However, the main hindrance for wider application of this technique is the...
Kais Klai, Denis Poitrenaud