Sciweavers

2468 search results - page 312 / 494
» Aggregation operators 2003
Sort
View
SPAA
2003
ACM
14 years 2 months ago
The complexity of verifying memory coherence
The general problem of verifying coherence for shared-memory multiprocessor executions is NP-Complete. Verifying memory consistency models is therefore NP-Hard, because memory con...
Jason F. Cantin, Mikko H. Lipasti, James E. Smith
WPES
2003
ACM
14 years 2 months ago
Hidden Credentials
Hidden Credentials are useful in situations where requests for service, credentials, access policies and resources are extremely sensitive. We show how transactions which depend o...
Jason E. Holt, Robert W. Bradshaw, Kent E. Seamons...
ACNS
2003
Springer
129views Cryptology» more  ACNS 2003»
14 years 2 months ago
Using Feedback to Improve Masquerade Detection
Abstract. To gain access to account privileges, an intruder masquerades as the proper account user. Information from user feedback helps to improve the accuracy of classifiers use...
Kwong H. Yung
ADAEUROPE
2003
Springer
14 years 2 months ago
Exposing Memory Corruption and Finding Leaks: Advanced Mechanisms in Ada
This article discusses the tools that Ada offers to deal with dynamic memory problems. The article shows how the storage pools mechanism of Ada 95 can be extended to enpower devel...
Emmanuel Briot, Franco Gasperoni, Robert Dewar, Di...
ADAEUROPE
2003
Springer
14 years 2 months ago
A Round Robin Scheduling Policy for Ada
Abstract. Although Ada defines a number of mechanisms for specifying scheduling policies, only one, Fifo Within Priorities is guaranteed to be supported by all implementations of ...
Alan Burns, Michael González Harbour, Andy ...