Sciweavers

3305 search results - page 150 / 661
» Can we Rely on SQL
Sort
View
ICCS
2007
Springer
14 years 4 months ago
On the Virtues of Generic Programming for Symbolic Computation
The purpose of this study is to measure the impact of C level code polynomial arithmetic on the performances of AXIOM highlevel algorithms, such as polynomial factorization. More p...
Xin Li, Marc Moreno Maza, Éric Schost
ICECCS
2005
IEEE
86views Hardware» more  ICECCS 2005»
14 years 4 months ago
Exploiting OS-Level Mechanisms to Implement Mobile Code Security
Mobile code systems provide an infrastructure that supports autonomous mobile components, called mobile agents. The infrastructure implements services for the transfer, execution,...
Viktoria Felmetsger, Giovanni Vigna
CAV
2010
Springer
161views Hardware» more  CAV 2010»
14 years 2 months ago
Directed Proof Generation for Machine Code
We present the algorithms used in MCVETO (Machine-Code VErification TOol), a tool to check whether a stripped machinecode program satisfies a safety property. The verification p...
Aditya V. Thakur, Junghee Lim, Akash Lal, Amanda B...
QOFIS
2000
Springer
14 years 1 months ago
The Direct Adjustment Algorithm: A TCP-Friendly Adaptation Scheme
Many distributed multimedia applications have the ability to adapt to uctuations in the network conditions. By adjusting temporal and spatial quality to available bandwidth, or man...
Dorgham Sisalem, Henning Schulzrinne
ICRA
2010
IEEE
128views Robotics» more  ICRA 2010»
13 years 8 months ago
Detecting anomalies in unmanned vehicles using the Mahalanobis distance
The use of unmanned autonomous vehicles is becoming more and more significant in recent years. The fact that the vehicles are unmanned (whether autonomous or not), can lead to gre...
Raz Lin, Eliahu Khalastchi, Gal A. Kaminka