Sciweavers

1963 search results - page 359 / 393
» How is aliasing used in systems software
Sort
View
PLDI
2005
ACM
14 years 2 months ago
TraceBack: first fault diagnosis by reconstruction of distributed control flow
Faults that occur in production systems are the most important faults to fix, but most production systems lack the debugging facilities present in development environments. TraceB...
Andrew Ayers, Richard Schooler, Chris Metcalf, Ana...
ACSAC
2002
IEEE
14 years 2 months ago
A Practical Approach to Identifying Storage and Timing Channels: Twenty Years Later
Secure computer systems use both mandatory and discretionary access controls to restrict the flow of information through legitimate communication channels such as files, shared ...
Richard A. Kemmerer
DLOG
2003
13 years 10 months ago
Incremental Query Answering for Implementing Document Retrieval Services
Agent systems that search the Semantic Web are seen as killer applications for description logic (DL) inference engines. The guiding examples for the Semantic Web involve informat...
Volker Haarslev, Ralf Möller
CHI
2005
ACM
14 years 9 months ago
Extensible input handling in the subArctic toolkit
The subArctic user interface toolkit has extensibility as one of its central goals. It seeks not only to supply a powerful library of reusable interactive objects, but also make i...
Scott E. Hudson, Jennifer Mankoff, Ian E. Smith
ECIS
2000
13 years 10 months ago
Design Breakdowns, Scenarios and Rapid Application Development
- In this paper we consider the way in which two representational forms, scenarios and design breakdowns, which have emerged in the tradition of participatory design are relevant w...
Paul Beynon-Davies