Sciweavers

73 search results - page 3 / 15
» bell 2006
Sort
View
ASPLOS
2006
ACM
15 years 3 months ago
Bell: bit-encoding online memory leak detection
Memory leaks compromise availability and security by crippling performance and crashing programs. Leaks are difficult to diagnose because they have no immediate symptoms. Online ...
Michael D. Bond, Kathryn S. McKinley
SACMAT
2006
ACM
15 years 3 months ago
The secondary and approximate authorization model and its application to Bell-LaPadula policies
We introduce the concept, model, and policy-specific algorithms for inferring new access control decisions from previous ones. Our secondary and approximate authorization model (...
Jason Crampton, Wing Leung, Konstantin Beznosov
ISPASS
2006
IEEE
15 years 3 months ago
Evaluating the efficacy of statistical simulation for design space exploration
Ajay Joshi, Joshua J. Yi, Robert H. Bell Jr., Liev...
JCT
2006
60views more  JCT 2006»
14 years 9 months ago
A simple proof of Graham and Pollak's theorem
Graham and Pollak (Bell System Tech. J. 50 (1971) 2495-2519) obtained a beautiful formula on the determinant of distance matrices of trees, which is independent of the structure o...
Weigen Yan, Yeong-Nan Yeh
69
Voted
BELL
2006
71views more  BELL 2006»
14 years 9 months ago
Design tools for transparent optical networks
s span three levels of abstraction, from routing and reconfigurable add/drop multiplexer (ROADM) choice, to span engineering, to power dynamics simulation. Each level represents a ...
Chandra Chekuri, Paul Claisse, René-Jean Es...