Sciweavers

579 search results - page 85 / 116
» Intersecting Classes and Prototypes
Sort
View
SP
2007
IEEE
107views Security Privacy» more  SP 2007»
14 years 2 months ago
Lurking in the Shadows: Identifying Systemic Threats to Kernel Data
The integrity of kernel code and data is fundamental to the integrity of the computer system. Tampering with the kernel data is an attractive venue for rootkit writers since malic...
Arati Baliga, Pandurang Kamat, Liviu Iftode
AMR
2007
Springer
143views Multimedia» more  AMR 2007»
14 years 2 months ago
User Modelling for Interactive User-Adaptive Collection Structuring
Abstract. Automatic structuring is one means to ease access to document collections, be it for organization or for exploration. Of even greater help would be a presentation that ad...
Andreas Nürnberger, Sebastian Stober
PEPM
2007
ACM
14 years 2 months ago
Quasi-terminating logic programs for ensuring the termination of partial evaluation
A logic program strongly quasi-terminates when only a finite number of distinct atoms (modulo variable renaming) are derivable from any given query and computation rule. This noti...
Germán Vidal
CCECE
2006
IEEE
14 years 1 months ago
A Formal CSP Framework for Message-Passing HPC Programming
To help programmers of high-performance computing (HPC) systems avoid communication-related errors, we employ a formal process algebra, Communicating Sequential Processes (CSP), w...
John D. Carter, William B. Gardner
CCECE
2006
IEEE
14 years 1 months ago
A High-Speed Low-Power Rail-to-Rail Buffer Amplifier for LCD Application
A high-speed low-power rail-to-rail class-B buffer amplifier, which is suitable for liquid crystal display applications, is proposed. The summing circuit is biased by the constant...
Chih-Wen Lu, Peter H. Xiao