Sciweavers

924 search results - page 181 / 185
» An expressive aspect language for system applications with A...
Sort
View
VLDB
2006
ACM
124views Database» more  VLDB 2006»
14 years 7 months ago
Dynamic buffer management with extensible replacement policies
The objective of extensible DBMSs is to ease the construction of specialized DBMSs for nontraditional applications. Although much work has been done in providing various levels of ...
Chong Leng Goh, Yanfeng Shu, Zhiyong Huang, Beng C...
DLOG
2001
13 years 9 months ago
Using Lazy Unfolding for the Computation of Least Common Subsumers
For description logics with existential restrictions, the size of the least common subsumer (lcs) of concept descriptions may grow exponentially in the size of the concept descrip...
Anni-Yasmin Turhan, Ralf Molitor
ATAL
2005
Springer
14 years 1 months ago
A scalable approach to multi-agent resource acquisition and control
Scalable coordination is a key challenge in deployment of multiagent systems. Resource usage is one part of agent behavior which naturally lends itself to abstraction. CyberOrgs i...
Nadeem Jamali, Xinghui Zhao
JBI
2006
140views Bioinformatics» more  JBI 2006»
13 years 7 months ago
Chester: Towards a personal medication advisor
Dialogue systems for health communication hold out the promise of providing intelligent assistance to patients through natural interfaces that require no training to use. But in o...
James F. Allen, George Ferguson, Nate Blaylock, Do...
SP
2006
IEEE
132views Security Privacy» more  SP 2006»
14 years 1 months ago
Towards Automatic Generation of Vulnerability-Based Signatures
In this paper we explore the problem of creating vulnerability signatures. A vulnerability signature matches all exploits of a given vulnerability, even polymorphic or metamorphic...
David Brumley, James Newsome, Dawn Xiaodong Song, ...