Sciweavers

3305 search results - page 90 / 661
» Can we Rely on SQL
Sort
View
ISCA
2009
IEEE
137views Hardware» more  ISCA 2009»
14 years 4 months ago
A case for an interleaving constrained shared-memory multi-processor
Shared-memory multi-threaded programming is inherently more difficult than single-threaded programming. The main source of complexity is that, the threads of an application can in...
Jie Yu, Satish Narayanasamy
CCS
2003
ACM
14 years 3 months ago
Countering code-injection attacks with instruction-set randomization
We describe a new, general approach for safeguarding systems against any type of code-injection attack. We apply Kerckhoff’s principle, by creating process-specific randomized ...
Gaurav S. Kc, Angelos D. Keromytis, Vassilis Preve...
JOLLI
2002
125views more  JOLLI 2002»
13 years 9 months ago
Some Notes on the Formal Properties of Bidirectional Optimality Theory
In this paper, we discuss some formal properties of the model of bidirectional Optimality Theory that was developed in Blutner 2000. We investigate the conditions under which bidi...
Gerhard Jäger
ICIP
2005
IEEE
14 years 11 months ago
Dynamic programming algorithm for rate-distortion optimized media streaming
We propose a dynamic programming algorithm for finding optimal transmission policies for a single packet in ratedistortion optimized media streaming. The algorithm relies on an op...
Jean Cardinal, Martin Röder, Raouf Hamzaoui
SIAMJO
2008
57views more  SIAMJO 2008»
13 years 10 months ago
Universal Confidence Sets for Solutions of Optimization Problems
We consider random approximations to deterministic optimization problems. The objective function and the constraint set can be approximated simultaneously. Relying on concentratio...
Silvia Vogel