Sciweavers

7839 search results - page 198 / 1568
» What's there and what's not
Sort
View
CCS
2006
ACM
15 years 5 months ago
On the modeling and analysis of obligations
Traditional security policies largely focus on access control requirements, which specify who can access what under what circumstances. Besides access control requirements, the av...
Keith Irwin, Ting Yu, William H. Winsborough
PC
2007
147views Management» more  PC 2007»
15 years 1 months ago
Thread-safety in an MPI implementation: Requirements and analysis
The MPI-2 Standard has carefully specified the interaction between MPI and usercreated threads. The goal of this specification is to allow users to write multithreaded MPI progr...
William Gropp, Rajeev Thakur
ATVA
2009
Springer
158views Hardware» more  ATVA 2009»
15 years 8 months ago
Logahedra: A New Weakly Relational Domain
Weakly relational numeric domains express restricted classes of linear inequalities that strike a balance between what can be described and what can be efficiently computed. Popula...
Jacob M. Howe, Andy King
101
Voted
JSSPP
2005
Springer
15 years 7 months ago
Pitfalls in Parallel Job Scheduling Evaluation
There are many choices to make when evaluating the performance of a complex system. In the context of parallel job scheduling, one must decide what workload to use and what measur...
Eitan Frachtenberg, Dror G. Feitelson
ICRA
2003
IEEE
96views Robotics» more  ICRA 2003»
15 years 6 months ago
DLR hand II: experiments and experiences with an anthropomorphic hand
Abstract— At our institute, two generations of antropomorphic hands have been designed. In quite a few experiments and demonstrations we could show the abilities of our hands and...
Christoph Borst, Max Fischer, Steffen Haidacher, H...