Sciweavers

524 search results - page 70 / 105
» Why phishing works
Sort
View
HPCA
2000
IEEE
15 years 4 months ago
Memory Dependence Speculation Tradeoffs in Centralized, Continuous-Window Superscalar Processors
We consider a variety of dynamic, hardware-based methods for exploiting load/store parallelism, including mechanisms that use memory dependence speculation. While previous work ha...
Andreas Moshovos, Gurindar S. Sohi
ATAL
2000
Springer
15 years 4 months ago
Layered Disclosure: Revealing Agents' Internals
A perennial challenge in creating and using complex autonomous agents is following their choices of actions as the world changes dynamically and understanding why they act as they ...
Patrick Riley, Peter Stone, Manuela M. Veloso
IUI
1999
ACM
15 years 4 months ago
Evaluating Adaptive Navigation Support
From the few evaluations of adaptive navigation systems that have been performed, we see an emerging pattern where depending upon the domain, only certain types of adaptive naviga...
Kristina Höök, Martin Svensson
VLDB
1999
ACM
136views Database» more  VLDB 1999»
15 years 4 months ago
O-O, What Have They Done to DB2?
In this paper, we describe our recent experiences in adding a number of object-relational extensions to the DB2 Universal Database UDB system as part of a research and developme...
Michael J. Carey, Donald D. Chamberlin, Srinivasa ...
KBSE
1998
IEEE
15 years 4 months ago
Planning Equational Verification in CCS
Most efforts to automate formal verification of communicating systems have centred around finite-state systems (FSSs). However, FSSs are incapable of modelling many practical comm...
Raul Monroy, Alan Bundy, Ian Green