Sciweavers

1466 search results - page 275 / 294
» Completeness of the Authentication Tests
Sort
View
SNPD
2008
13 years 9 months ago
An Approach to Modeling Software Safety
: Software for safety-critical systems has to deal with the hazards identified by safety analysis in order to make the system safe, risk-free and fail-safe. Software safety is a co...
M. Ben Swarup, P. Seetha Ramaiah
BDA
2006
13 years 9 months ago
Type-Based XML Projection
XML data projection (or pruning) is one of the main optimization techniques recently adopted in the context of main-memory XML query-engines. The underlying idea is quite simple: ...
Véronique Benzaken, Giuseppe Castagna, Dari...
IJCAI
2001
13 years 9 months ago
Solving Non-Boolean Satisfiability Problems with Stochastic Local Search
Much excitement has been generated by the success of stochastic local search procedures at finding solutions to large, very hard satisfiability problems. Many of the problems on wh...
Alan M. Frisch, Timothy J. Peugniez
TREC
2001
13 years 9 months ago
Observations of Searchers: OHSU TREC 2001 Interactive Track
The goal of the TREC 2001 Interactive Track was to carry out observational experiments of Web-based searching to develop hypotheses for experiments in subsequent years. Each parti...
William R. Hersh, Lynetta Sacherek, Daniel Olson
VISSYM
2004
13 years 9 months ago
Occlusion Culling for Sub-Surface Models in Geo-Scientific Applications
We present a three pass occlusion culling algorithm, which makes efficient use of hardware support. Our geo-scientific sub-surface data sets consist typically of a set of high res...
John Plate, Anselm Grundhöfer, Benjamin Schmi...