Sciweavers

2814 search results - page 542 / 563
» Can We Make Operating Systems Reliable and Secure
Sort
View
CONEXT
2009
ACM
15 years 5 months ago
RFDump: an architecture for monitoring the wireless ether
Networking researchers have been using tools like wireshark and tcpdump to sniff packets on physical links that use different types of datalink protocols, e.g. Ethernet or 802.11,...
Kaushik Lakshminarayanan, Samir Sapra, Srinivasan ...
VMCAI
2010
Springer
16 years 1 months ago
Building a Calculus of Data Structures
Abstract. Techniques such as verification condition generation, preditraction, and expressive type systems reduce software verification to proving formulas in expressive logics. Pr...
Viktor Kuncak, Ruzica Piskac, Philippe Suter, Thom...
AAAI
2007
15 years 7 months ago
Concurrent Action Execution with Shared Fluents
Concurrent action execution is important for plan-length minimization. However, action specifications are often limited to avoid conflicts arising from precondition/effect inter...
Michael Buro, Alexander Kovarsky
VIS
2004
IEEE
204views Visualization» more  VIS 2004»
16 years 5 months ago
Exploration of the Brain's White Matter Pathways with Dynamic Queries
Diffusion Tensor Imaging (DTI) is a magnetic resonance imaging method that can be used to measure local information about the structure of white matter within the human brain. Com...
David Akers, Anthony Sherbondy, Rachel Mackenzie, ...
IWMM
2009
Springer
107views Hardware» more  IWMM 2009»
15 years 11 months ago
Self-recovery in server programs
It is important that long running server programs retain availability amidst software failures. However, server programs do fail and one of the important causes of failures in ser...
Vijay Nagarajan, Dennis Jeffrey, Rajiv Gupta