Sciweavers

137 search results - page 9 / 28
» National Science Foundation Graduate Research Fellowship Pro...
Sort
View
ECOOPW
1999
Springer
13 years 12 months ago
Providing Policy-Neutral and Transparent Access Control in Extensible Systems
Extensible systems, such as Java or the SPIN extensible operating system, allow for units of code, or extensions, to be added to a running system in almost arbitrary fashion. Exte...
Robert Grimm, Brian N. Bershad
RSA
1998
93views more  RSA 1998»
13 years 7 months ago
Parallel randomized load balancing
It is well known that after placing n balls independently and uniformly at random into n bins, the fullest bin holds (logn=log logn) balls with high probability. Recently, Azar et...
Micah Adler, Soumen Chakrabarti, Michael Mitzenmac...
IJAC
2008
58views more  IJAC 2008»
13 years 7 months ago
Limit Preservation Properties of the Greatest Semilattice Image Functor
We study what kinds of limits are preserved by the greatest semilattice image functor from the category of all semigroups to its subcategory of all semilattices. The second autho...
George Janelidze, Valdis Laan, László...
COLT
1995
Springer
13 years 11 months ago
Exactly Learning Automata with Small Cover Time
We present algorithms for exactly learning unknown environments that can be described by deterministic nite automata. The learner performs a walk on the target automaton, where at...
Dana Ron, Ronitt Rubinfeld
CCS
2006
ACM
13 years 11 months ago
Replayer: automatic protocol replay by binary analysis
We address the problem of replaying an application dialog between two hosts. The ability to accurately replay application dialogs is useful in many security-oriented applications,...
James Newsome, David Brumley, Jason Franklin, Dawn...