Sciweavers

21094 search results - page 4186 / 4219
» An experiment using DLV-K
Sort
View
RV
2010
Springer
177views Hardware» more  RV 2010»
13 years 8 months ago
Runtime Instrumentation for Precise Flow-Sensitive Type Analysis
We describe a combination of runtime information and static analysis for checking properties of complex and configurable systems. The basic idea of our approach is to 1) let the p...
Etienne Kneuss, Philippe Suter, Viktor Kuncak
SIAMSC
2010
132views more  SIAMSC 2010»
13 years 8 months ago
A Posteriori Error Estimates Including Algebraic Error and Stopping Criteria for Iterative Solvers
For the finite volume discretization of a second-order elliptic model problem, we derive a posteriori error estimates which take into account an inexact solution of the associated...
Pavel Jiránek, Zdenek Strakos, Martin Vohra...
SIGMOD
2010
ACM
308views Database» more  SIGMOD 2010»
13 years 8 months ago
GBLENDER: towards blending visual query formulation and query processing in graph databases
Given a graph database D and a query graph g, an exact subgraph matching query asks for the set S of graphs in D that contain g as a subgraph. This type of queries find important...
Changjiu Jin, Sourav S. Bhowmick, Xiaokui Xiao, Ja...
TCOM
2010
109views more  TCOM 2010»
13 years 8 months ago
Results on Finite Wireless Networks on a Line
Abstract— Today, due to the vast amount of literature on largescale wireless networks, we have a fair understanding of the asymptotic behavior of such networks. However, in real ...
Ali Eslami, Mohammad Nekoui, Hossein Pishro-Nik
TDSC
2010
191views more  TDSC 2010»
13 years 8 months ago
SigFree: A Signature-Free Buffer Overflow Attack Blocker
—We propose SigFree, an online signature-free out-of-the-box application-layer method for blocking code-injection buffer overflow attack messages targeting at various Internet se...
Xinran Wang, Chi-Chun Pan, Peng Liu, Sencun Zhu
« Prev « First page 4186 / 4219 Last » Next »