Sciweavers

716 search results - page 43 / 144
» time 1997
Sort
View
ACISP
1997
Springer
15 years 4 months ago
A Method to Implement a Denial of Service Protection Base
Denial of service attack is an attempt from any authorized or unauthorized entity to allocate resources excessively to prevent normal operation of the system. A method will be pres...
Jussipekka Leiwo, Yuliang Zheng
CCS
1997
ACM
15 years 4 months ago
The Security of Static Typing with Dynamic Linking
Dynamic linking is a requirement for portable executable content. Executable content cannot know, ahead of time, where it is going to be executed, nor know the proper operating sy...
Drew Dean
ISAAC
1997
Springer
162views Algorithms» more  ISAAC 1997»
15 years 4 months ago
A Randomized Linear Work EREW PRAM Algorithm to Find a Minimum Spanning Forest
We present a randomized EREW PRAM algorithm to nd a minimum spanning forest in a weighted undirected graph. On an n-vertex graph the algorithm runs in o((logn)1+ ) expected time f...
Chung Keung Poon, Vijaya Ramachandran
WG
1997
Springer
15 years 4 months ago
Parallel Algorithms for Treewidth Two
In this paper we present a parallel algorithm that decides whether a graph G has treewidth at most two, and if so, construct a tree decomposition or path decomposition of minimum ...
Babette de Fluiter, Hans L. Bodlaender
WSC
1997
15 years 1 months ago
Simulation of a Paint Shop Power and Free Line
We describe the application of simulation and statistical analyses to the process improvement of a paint shop within a heavy manufacturing plant. The explicit objectives of this s...
Edward J. Williams, Shigeru Sadakane